If you can't beat them - secure them
|
|
|
- Anis Chambers
- 10 years ago
- Views:
Transcription
1 If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture.
2 Preface: Mobile adoption New apps deployed in the cloud Allow access to their networks Employees use two or more devices Smart phone sales roughly doubled in the last financial year. Approx. 80 of the Fortune 100 companies are deploying or evaluating the Apple ipad for enterprise. By 2014, 90% of organizations will support corporate applications on personal devices Smartphone vendors shipped million handsets in Q2 2012, compared to units in the Q (Source IDC) 2
3 Preface: Mobile adoption Mobile technologies are a standard part of work life Mobile banking users exceeded 150 million globally in 2011 Value of mobile payments to reach $110 billion in 2013, CAGR of 105% Sales of Smartphones were up by 42.7%,with Apple and Samsung together accounting for 83% market share (Source Gartner 2012) Global Hits from Mobile Devices (Jan 2012) 3G Mobile Network Coverage Total Mobile Apps Downloaded in 2011 Expenditure on Mobile Advertising Worldwide in 2011 Mobile Payments Users in % 45% of world population 29 Billion Apps USD 3.3 Billion 14.1 Million Source: StatCounter Source: ITU Source: ABI Research Source: Gartner Source: Gartner. 3
4 Preface: Bring Your Own Device context Bring your own device (BYOD) is termed as a business policy of employees bringing personally owned mobile devices to their workplace and using those devices to access privileged company resources such as , file servers and databases as well as their personal applications and data. Recent survey 39% 69% 340% 2,170% M corp PCs M corp PCs M personal PCs M personal PCs M smartphones M smartphones M tablets M tablets Mobile Device Explosion paves way for BYOD 4
5 Contents Your worst BYOD Nightmare Waking up from my BYOD nightmare where am I? Controlling BYOD: From woe to go Safeguard controls for mobile devices Final Notes 5
6 Your worst BYOD Nightmare is to not realise that the cord has already been cut: From smart phones to tablets to laptops, mobile technologies have become a standard part of work life, offering productivity and efficiency gains as well as enhanced services for customers. The ways in which these technologies interweave work life and personal life raise a major security challenge for most organizations. Meanwhile, Cybercrime organisations aggregate and mine user data for new attacks In this new world, old-fashioned Information Risk Assessment methodology still apply Topics to be discussed over the next few minutes: o Risk Assessment in a Mobile world o Mobile Reference Architecture on commonly used components of mobile in a corporate landscape o Mobile profile to understand the scope of your clients mobile environment and related vulnerabilities o Threat, Vulnerabilities and Controls database to help identify threats that apply to your clients situation and which controls would be suitable to mitigate the risks 6
7 BYOD is a reality, requiring executive action Mobility comes with risks that are different from the standard enterprise IT environment. Mobile technologies require a different response from the executives, charged with defending their enterprise from cyber attacks and enabling the enterprise to improve operations and expand their markets more effectively Few devices know more personal details about people than the smart phones in their pockets: phone numbers, current location, passwords, personal details etc and vulnerabilities abound. They are prone to being lost or stolen, yet very few are encrypted. Unlike desktop or laptop computers, smart phones have customized hardware architectures, and even open source operating systems like Android which comes in many versions. Often, it s up to users to accept and install the patches, resulting in an inconsistent mobile device security posture Business needs demanding rapid Mobility enablement: CIO involvement is key Mobile malware can enter a device at many points: An end-to-end approach is necessary 7
8 Contents Your worst BYOD Nightmare Waking up from my BYOD nightmare where am I? Controlling BYOD: From woe to go Safeguard controls for mobile devices Final Notes 8
9 Waking up from my BYOD nightmare where am I? Waking up: Risk Assessment helps us find as-is, and desired to-be Security Risk assessment such as ISO 27005:2011 is mapped to the a project delivery lifecycle. After the assessment, a remediation project is typically started to treat the risks identified, reaching a desired to-be status less nightmarish. Project Management Plan Analyse Design Build & Test Risk Assessment Initiation Establish Context Establish Risk Assessment Context Identify Current Landscape Threats, Vulnerabilities & Existing Controls Inherent Risks Analyse Residual Risk Evaluate Evaluate Residual Risks Suggest Controls Document Assessment Results Transition to Remediation Project / Risk Management Operations Remediation Approach Cost Benefit Analysis Control Implementation Treat Implement Controls Validate & Test Implementation Measure Performance Transition to Deploy and Support Phases Information Risk Assessment Project Scope Follow on remediation Project scope 9
10 Accenture: Added Risk Extensions to the Risk Assessment methodology The Risk Extension components can be used in specific steps of the risk assessment Experience with Mobility helps accelerating Assessment and Remediation phases Project Management Plan Analyse Design Build & Test Risk Assessment Process Risk Assessment Initiation Establish Context Establish Risk Assessment Context Identify Current Landscape Threats, Vulnerabilities & Existing Controls Inherent Risks Analyse Residual Risk Evaluate Evaluate Residual Risks Suggest Controls Document Assessment Results Transition to Remediation Project / Risk Management Operations Remediation Approach Cost Benefit Analysis Control Implementation Treat Implement Controls Validate & Test Implementation Measure Performance Transition to Deploy and Support Phases Mobile Profile Risk Extension Reference architecture TVC database Collection of inputs Establish Context Identify Analyse Evaluate Treat Risk Assessment Extension for Mobile 10
11 Mapping risks to architecture landscape 1. Data Storage and Transmission 2. Higher Privileges than required and/or authorized 3. Failure to disable or insecure mobile device platform features 4. Access without strong authentication 5. Malicious/Counterfeit third-party code 6. Insecure or unnecessary interaction between applications and OS components 7. Un-validated or un-authenticated input 8. Data Leakage 9. Client-side injection and overflows 10. Client-side DoS 11 11
12 Contents Your worst BYOD Nightmare Waking up from my BYOD nightmare where am I? Controlling BYOD: From woe to go Safeguard controls for mobile devices Final Notes 12
13 Controlling BYOD: From woe to go Our experience: Core capabilities are required for managing a Mobile solution 13
14 From woe to go: Layered approach The Device Use an end-to-end approach, from manufacturing to disposal Assume many mobile devices used by employees will not be secure. The Application Provide layers of security If someone bypasses one security measure additional security protects data. The Back-end system Consider multi-factor authentication (e.g. biometrics plus password) and host level security and monitoring. The Network Secure and monitor corporate wireless networks Demand better security from wireless network service providers 14
15 From woe to go: Standardised approach TVC database Accenture developed a solution that takes Assets, threats and vulnerabilities related to mobile environments, cross-referenced and mapped to the reference architecture. Likewise, suggested controls are listed to recommend defense in depth mitigations. Out-of-the-box, the August 2012 release of the Threat, Vulnerability and Controls (TVC) database contains following information: Information assets 43 mobile threats based on various threat reports 37 vulnerabilities based on vulnerability research for the components in the mobile profile and reference architecture 40 information assets based on vulnerability research for the components in the mobile profile and reference architecture 70 controls and their attributes based on analyst reports for functionalities of top-of-class solutions and mobile security controls research Elements are cross-referenced in the structure depicted on the right Additional elements are added per quarterly release Vulnerabilities Threats Reference architecture Controls 15
16 Contents Your worst BYOD Nightmare Waking up from my BYOD nightmare where am I? Controlling BYOD: From woe to go Safeguard controls for mobile devices Final Notes 16
17 Safeguard controls for mobile devices There are 2 approaches to safeguard mobile devices Mobile Device Management (MDM) Secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-theair distribution of applications, data and configuration settings for all types of mobile devices, Mobile Application Management (MAM) App Centric strategy is around for developing, securing, deploying, configuring, updating and removing business applications from mobile devices centrally. Application Wrapping: MAM functionality includes wrapping of the enterprise application as per the business policies. Key Aspect MDM only protects and secures the mobile devices. It does not control the applications,data or transactions. BYOD Success = Mastering BYOD Control Points Key Aspect MAM provides application level security to maintain both personal and corporate data with different security levels. Devices Apps Data 17
18 Mobile Device Management (MDM) Enable Activate enterprise access, apps and data easily and automatically ios, Win Mobile, BB, Symbian Secure Protect enterprise data and infrastructure from attack and theft Prevent JB, ensure passcodes. Manage Control inventory and configuration with massive scalability Tracking the device 18
19 Mobile Device Management (MDM) features Authentication and Access Control Integration with LDAP 2 factor authentication Single sign on Digital certification for mobile device/smartphone authentication (e.g. Managed PKI solution Information Protection DLP for Mobile devices Antivirus /Malware protection App Center / Cloud for application data management Device Control and Management Managed Device Inventory Remote assistance and wipe out Compliance /policy enforcement(e.g. certificate distribution, password management, camera permission, encryption management) Device Security - Anti malware /Live updates, SMS anti-spam, location update of devices, Application control. App Distribution and Collaboration Application provisioning as per the business requirements. No Protection of the data. 19
20 Mobile Application Management (MAM) Corporate Computing in Transition By 2014, 90% of organizations will support corporate applications on personal devices By 2013, 80% of businesses will support a workforce using tablets Developer Creates apps either native or web Readies it for publishing Notifies Admin via App center Source: Gartner IT Administrator Role based permissions and reporting Enforcement of corporate policies with respect to apps or content Distributed through App store/cloud Employee Receives notification that app or doc is available. Downloads and runs the secured app or accesses the secured doc Has familiar app store experience 20
21 Mobile Application Management (MAM) features Policy Management User authentication and integration with AD/LDAP Encryption Access control on Jail broken devices Restriction to network connections Document sharing Offline access Additional content policies such as versioning and expiry Secure Browser Web apps are tied to specific set of authorized sites (e.g. intranet sites) Inter application data transfer protection Restricting copy paste / downloading content Multiple deployment options Cloud based On-premise : Private cloud or Virtual appliance Reporting Standard reporting on application usage Downloads Data access requests Users Connectivity Real -time metrics Supports Diverse Content types PDFs Videos Forums epub documents 21
22 Contents Introduction Relation with Information Risk Assessment Method Controlling BYOD: From woe to go Safeguard controls for mobile devices Final Notes 22
23 Final notes More details on this topic Unplugged and Exposed: Rethinking Cyber Security for a Mobile World Accenture Best Practices in Securing Endpoint Computing Devices Information Security Forum Best Practices for Mobile Device Banking Security ATM Industry Association Guidelines on Cell Phone and PDA Security NIST Special Publication The CIO s Guide to Mobile Security Research in Motion Limited Gartner s market overview of Mobile Device Management market. Contact info: Accenture ANZ Security lead: Tor Jomar Nordhagen, [email protected] Accenture Perth Security lead: Benjamin Brophy, [email protected] Accenture Mobility&Security: Andreas Kafka, [email protected] 23
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Mobility Challenges & Trends The Financial Services Point Of View
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
Mobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
MAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
Technical Note. ForeScout MDM Data Security
Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Risk and threats everywhere, all the time
Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
Enterpise Mobility Lexicon & Terminology
1 Enterpise Mobility Lexicon & Terminology www.openratio.com By Rabih Kanaan 1 Amazon SNS Amazon Simple Notification Service (SNS) is a push messaging service that makes it simple & cost-effective to push
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Application Development Best Practices
Application Development Best Practices THE ENTERPRISE MOBILUTION ERA An InfoStretch White Paper August 2014 Elevating confidence 3200 Patrick Henry Drive, Suite 250 Santa Clara, CA 95054 408.727.1100 [email protected]
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system
MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011
Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention
Mobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
Mobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor
Bring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
