Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
|
|
|
- Gwendolyn Lewis
- 10 years ago
- Views:
Transcription
1 Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
2 Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement officers in the field to receive dispatch calls or access a subject s arrest record via mobile technology. But what about a detective fingerprinting a murder victim at the scene of the crime and learning his identity instantly? Or an officer finding a missing person just hours after a department in another state posted the report? What if every photo of a crime scene had the time and location automatically recorded for evidential purposes? Mobile devices are making these scenarios possible by enabling dispatched officers to access and update criminal justice information (CJI) databases in real time. The Criminal Justice Information Services (CJIS) department recognizes that mobility is playing an increasingly central role in law enforcement. Every year, CJIS releases an updated version of the CJIS Security Policy, which provide[s] appropriate controls to protect the full lifecycle of CJI, which includes a growing body of regulations governing information that is viewed, transmitted and stored electronically. Version 5.3, published in August 2014, includes regulations that are specific to mobile devices. Requirements in the new Policy Area 13 govern the use and management of mobile devices and address how existing policies apply to mobile. Policy Area 13 replaces the Mobile Appendix that appeared in the 2013 version of the policy, which outlined the future policies that this version makes effective. This white paper provides guidelines for securing mobile devices accessing CJI, in accordance with the requirements of CJIS Security Policy Area 13: Mobile Devices, and provides an overview of how AirWatch technologies help support CJIS compliance. CJIS specifies that agencies must authorize, monitor and control wireless access to CJI for all wireless technologies, including all wireless access points, as well as cellular, Bluetooth, satellite, microwave and land mobile radio devices. Mobile Device Management For the first time this year, the CJIS Security Policy specifically calls out the use of smartphones and tablets. The CJIS Security Policy previously recommended mobile device management (MDM) as necessary in most cases. The Policy now requires law enforcement agencies to implement MDM. Previously, CJIS recommended centralized administration capable of remotely locking or wiping mobile devices, setting and locking device configuration, detecting jailbroken or rooted devices and enforcing folder- or disk-level encryption. The updated policy adds application of mandatory policy settings on the device and detection of unauthorized configurations or software/applications to that list. Additionally, MDM must be used to ensure that CJI is only transferred between CJI authorized applications and storage areas of the device, and not stored or transmitted in unmanaged applications or areas (Section ).
3 Wireless Device Risk Mitigations CJIS requires that law enforcement agencies perform the following actions to maintain compliance on cellular and wireless devices: Apply Available Critical Patches and Upgrades New operating systems and software can introduce new threats and vulnerabilities, so it is critical to apply security patches and upgrades as soon as they are available. All users should also run the latest versions of any MDM or enterprise mobility management (EMM) applications. From the central console, AirWatch administrators can view the OS version and app versions on devices in their deployment, and even push updates to users devices over the air (OTA). For device platforms that do not allow OTA updates, AirWatch administrators can prompt and require users to download the latest OS and application updates. It is critical to choose an MDM or EMM solution that offers same-day support for new devices and OS versions. If a user purchases a new device or downloads an OS update that the MDM software does not support, the device will not be secured until the MDM provider comes out with an update. AirWatch works alongside the leaders in mobile technology and offers same-day support for new devices and OS updates across manufacturers. AirWatch supports all major devices and operating systems, which can be a key component in maintaining compliance. There will often be a variety of devices that need access to CJI, such as a police officer running a tag on a tablet before he or she gives a ticket, or an officer delivering a parking ticket from a rugged device. A smartphone may be used in or outside the office to access CJI. The AirWatch management console is a central point to monitor and secure each device, regardless of location or form factor. For IT, this significantly reduces complexity in mobility management by unifying management across an entire organization. From a single point, administrators can apply patches and updates and see real-time views of all devices in a deployment and the software they are running. Configure Devices for Local Device Authentication CJIS requires mobile devices that access CJI to have local device authentication, or device-level passcodes. According to the CJIS Security Policy, when agencies implement the use of a PIN as a standard authenticator, they should: Be a minimum length of eight characters of all systems Not be a dictionary word or proper name Not be the same as the User ID Expire within a maximum of 90 calendar days Not be identical to the previous 10 passwords Not be transmitted in the clear outside the secure location Not be displayed when entered
4 The standards are not quite as strict when a PIN is used for advanced authentication along with a certificate or token. If a PIN is entered to invoke a certificate or other form of advanced authentication, which is required in certain situations, it must meet the following requirements: Be a minimum of six digits Have no repeating digits (i.e., ) Have no sequential patterns (i.e., ) Not be the same as the User ID. Expire within a maximum of 365 calendar days. If a PIN is used to access a soft certificate which is the second factor of authentication, AND the first factor is a password that complies with the requirements in Section , then the 365 day expiration requirement can be waived by the CSO. Not be identical to the previous three (3) PINs. Not be transmitted in the clear outside the secure location. Not be displayed when entered. CJIS has added an exception to these requirements in the 2014 policy: When a PIN is used only for local device authentication, the only requirement is that it be a minimum of six digits. With AirWatch, administrators can set security profiles to achieve each of the above requirements. For advanced security, administrators can require the use of a combination of numbers, letters and complex characters for passcodes up to 16 characters long. Additionally, administrators can set a profile that will automatically wipe data from a device after a specified amount of failed login attempts. The CJIS Security Policy recommends configuring a remote wipe after a specified amount of failed login attempts based on the value placed on the information residing on the device. In addition, AirWatch can configure short session lock times and reset passcodes over the air (OTA) to help keep devices secure if they are left unattended. Use Advanced Authentication CJIS has added section to clarify the situations that require advanced authentication (AA), which confirms the identity of a user beyond a username and password. According to the CJIS Security Policy, The requirement to use or not use AA is dependent upon the physical, personnel, and technical security controls associated with the user location and whether CJI is accessed directly or indirectly. Advanced authentication is required except in the following situations: When the user is requesting access to CJI from a secure location (see section 5.9 for secure location requirements) When technical security controls have been met (sections 5.5 and 5.10) When the user has only indirect access to CJI
5 CJIS has included a decision tree in this year s policy to help agencies determine whether or not they should use advanced authentication. When advanced authentication is required, agencies must use two of the following three factors for authentication on mobile devices: something you know (i.e. password), something you have (i.e. token), something you are (i.e. biometric). With AirWatch, administrators can require multifactor authentication by enforcing a passcode at the device level and enforcing a secondary authentication method at the application or network level. AirWatch supports authentication through the use and implementation of software tokens, hardware tokens, smart cards, certificates and biometrics such as fingerprint scanners. AirWatch applications will soon integrate with EyeVerify to support secondary biometric authentication using eye vein verification. AirWatch also supports authentication with username/password, directory services credentials, SAML, or proxy authentication methods. Organizations can also leverage AirWatch App Wrapping AirWatch and the AirWatch Software Development Kit to create additional layers of authentication and security for public or custom applications. The policy also outlines specific requirements for the storage of certificates or cryptographic keys on mobile devices. When used as an authentication method, certificates and cryptographic keys must be protected against being extracted, be configured for remote wipe on-demand and be configured to use a secure authenticator such as a PIN or password to unlock the key for use. Secure AirWatch applications also require users to enter a PIN and pass a second layer of authentication to allow secure access to CJI. AirWatch can be configured to automatically and remotely perform a device wipe after a certain number of failed logins or after any action that the administrator pre-sets to trigger a device wipe. AirWatch supports protection against certificate and cryptographic key extraction by supporting devices which comply with this standard with a native key store. Compensating controls for meeting the AA requirement In this year s policy, CJIS for the first time lists CSO-approved compensating controls to temporarily meet the AA requirement when an agency cannot meet requirements due to legitimate technical or business constraints. Compensating controls must meet the intent of the AA requirement, provide a similar level of protection and not rely upon existing requirements for AA as compensating controls. To meet compensating control requirements, mobile device management must be implemented and provide at least two of the following: Possession of the agency issued smartphone, tablet, or ipad as an indication it is the authorized user Implemented password protection on the mobile device management application and/or secure container where the authentication application is stored Enable remote device locking Enable remote data deletion Enable automatic data wipe after predetermined number of failed authentication attempts Remote device location (GPS) tracking
6 Require CJIS Security Policy compliant password to access the device Use of device certificates Administrators can use AirWatch Mobile Device Management controls to implement, enable and require all of the above requirements. Encrypt All CJI Data Resident on the Device Device-level encryption enables users to encrypt sensitive information stored on mobile devices. Mobile device manufacturers support their own device level FIPS validation by developing cryptographic modules or using pre-validated OpenSSL cryptographic modules at the device level. AirWatch users should be aware of the FIPS certification of the device types in their deployment to ensure an end-to-end secure mobile architecture. For devices that include device or SD card-level encryption, AirWatch can enforce the use of encryption remotely from the console, for both in-device drives and removable drives. For hosting platforms and device applications that do not exercise FIPS validated cryptographic modules or libraries, AirWatch supports FIPS validated solutions such as AirWatch Secure Content Locker, which uses the FIPS validated OpenSSL AES-256 cryptographic module to provide encryption for data at rest and in transit. AirWatch also includes a number of data loss prevention features administrators can use as an additional safeguard for CJI. Features like hyperlink and document stripping in s, disabling Apple AirDrop and using advanced data loss protection (DLP) policies in AirWatch Secure Content Locker can reinforce security around content. With AirWatch Secure Content Locker, administrators can employ advanced DLP settings. Documents can be given expiration dates to ensure content on the device consists of only the most up-to-date and necessary documents. Administrators can also leverage geofencing to set a virtual perimeter within which users can access sensitive data. Once a device leaves the perimeter, access is automatically disabled. Erase Cached Information When Session is Terminated The CJIS Security Policy requires that any browser accessing CJI must erase all cached information when the session is terminated. With AirWatch, administrators can disable native browsers and public browser applications to drive all browsing through the secure AirWatch Browser. With AirWatch Browser, a user s browsing cache and cookies can automatically be cleared each time the browser is closed. Administrators can also customize web browsing, whitelist and blacklist websites, leverage existing web filters and more. AirWatch Browser is pre-configured to use app tunneling through the AirWatch Mobile Access Gateway to proxy access to internal resources in a LAN. The AirWatch Mobile Access Gateway provides a single, secure point of entry for all compliant devices to access enterprise services. Communication between AirWatch Browser and internal networks is encrypted using TLS/SSL and certificate-based authentication.. Administrators can enable VPN-like functionality without requiring a third-party VPN on the device.
7 Employ Personal Firewalls or Run a MDM System that Facilitates the Ability to Provide Firewall Services from the Agency Level The CJIS security policy recommends the following capabilities for firewall services: Audit and limit the applications installed on the device From the AirWatch console, administrators can audit applications, disable applications, blacklist certain apps and run reports on usage. Block unsolicited requests to connect with the device AirWatch enables administrators to prevent unknown devices from connecting to corporate networks and can configure certificate-based access to corporate applications, , VPN and Wi-Fi networks. Filter incoming traffic by IP address or protocol AirWatch VPN On Demand and AirWatch AppTunnel enable administrators to grant access based on group, allowing or denying access to sites based on IP address. Filter incoming traffic by destination points (same as above) AirWatch can enforce a global proxy that forces all traffic to be routed through the VPN back to the company and then disseminated from the organization s network. For devices that don t have global proxies, administrators can configure mandatory VPN to route traffic through the organization s network. After the route is configured, all traffic will go through the organization s existing web filtering. Maintain an IP traffic log As stated by CJIS, this may not be feasible on most mobile operating systems, but could be run on applications that communicate over or accept connections from a secure network. AirWatch also partners with several network access control (NAC) providers to filter traffic and ensure the security of Wi-Fi networks. Employ Antivirus Software or Run a MDM System that Facilitates the Ability to Provide Antivirus Services from the Agency Level AirWatch can push antivirus applications to devices and integrate with various antivirus software providers. As stated in the CJIS Security Policy document, One method to compensate for the technical infeasibility of traditional anti-virus and malicious code protection is to install an MDM that performs periodic system integrity checks that validate device configuration and status against an approved baseline. From the AirWatch console, administrators can schedule and run routine device integrity checks to ensure the device has not been compromised. With the AirWatch compliance engine, automated actions can be configured to act upon unauthorized actions such as jailbreaking or rooting a device. For example, if a device is found to be in a compromised state, the AirWatch compliance engine can automatically wipe all CJI data off the device to ensure the organization remains compliant with the CJIS Security Policy and that all CJI data remains out of malicious hands. Other Considerations The CJIS Security Policy outlines several other factors that necessitate the use of third-party management software, such as the ability to manage multiple users, implement audit and accountability functions and require local device authentication. These requirements cannot be met with a limited function operating system alone and require the use of MDM.
8 The Policy now also requires enhanced incident reporting and handling procedures to address mobile device operating scenarios. According to CJIS, Rapid response to mobile device related incidents can significantly mitigate the risks associated with illicit data access either on the device itself or within online data resources associated with the device through an application or specialized interface. CJIS requires special procedures for loss of device control, the total loss of a device or any form of device compromise. AirWatch helps administrators meet these requirements through both automated, pre-set actions and remote capabilities that can be performed on demand. The AirWatch compliance engine enables administrators to automate escalating actions when certain conditions are met. For example, a pre-set profile can trigger a device to automatically lock after a specified period of time. Administrators can also remotely lock a device that has left agency control or is suspected to be compromised, as well as change the password. Any device can be remotely wiped of all content and restored to factory settings at any time. Preparing for the Future When handling and protecting CJI, there are measures organizations can take to go beyond the minimum security requirements set forth by the CJIS Security Policy. Over time, more risks will emerge, and remaining a step ahead of new threats can help organizations remain compliant even as policies evolve and change. An organization should look to an EMM provider that has the ability to scale with the organization and provide same-day support for all OSes and new devices. With a properly configured EMM solution in place, organizations can be prepared for an audit at a moment s notice. A complete EMM solution set such as AirWatch Enterprise mobility Management gives organizations the ability to protect CJI beyond basic requirements and give field officers and government officials unprecedented access to the data they need to protect and serve. For more information, visit the FBI CJIS Security Policy Resource Center.
9 Additional Resources For additional information, visit: To get started with a free trial of AirWatch, visit AirWatch Global Headquarters 1155 Perimeter Center West Suite 100 Atlanta, GA United States T: E: [email protected] About AirWatch by VMware AirWatch by VMware is the leader in enterprise mobility management with a platform including industryleadng mobile device, , application, content and browser management solutions. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Alan Ferretti CJIS Information Security Officer
Alan Ferretti CJIS Information Security Officer AGENDA What is CJIS? What is the APB? What is new in the latest version of the CJIS Security Policy? Advanced Authentication change Mobile policy for Tablets
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Getting Started - MDM Setup
Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Best Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
Vodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Systems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
McAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
Addressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment
6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment 6 Steps to a Successful Migration Determine whether a cutover or a gradual migration makes more sense. Integrate BES into AirWatch for
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)
Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Introduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Cloud Services MDM. Overview & Setup Admin Guide
Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
Managing Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
Introduction to the AirWatch Browser Guide
Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
