Guideline on Safe BYOD Management

Size: px
Start display at page:

Download "Guideline on Safe BYOD Management"

Transcription

1 CMSGu Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version 1.0 June March Issue No. 41

2 Table of Contents 1.0 Introduction Purpose and Scope Audience Document Structure Background The Risks of Bring Your Own Device (BYOD) An Alternate Way for Malware to Penetrate the Corporate Network Hacker Threats BYOD Brings More Complexity to IT Management Corporate and Personal Data Mix on One Device Loss of Mobile Device Risks from Other Devices Mobile Device Management (MDM) What is MDM? Components of MDM Mobile Device Lifecycle Management When is MDM Required? Guidance for Selecting a MDM Solution MDM Solutions Deploying a MDM Solution Sample Mobile Device Security Policy Conclusion References Appendix A List of Acronyms Guideline on Safe BYOD Management P a g e 2

3 Tables DISCLAIMER: This guideline is provided as is for informational purposes only. Information in this guideline, including references, is subject to change without notice. The products mentioned herein are the trademarks of their respective owners. Guideline on Safe BYOD Management P a g e 3

4 1.0 Introduction 1.1 Purpose and Scope The purpose of this guideline is to give organisations an insight of the risks associated with Bring Your Own Device (BYOD) and how the adoption of a Mobile Device Management (MDM) solution could help in mitigating some of those risks. 1.2 Audience The target audience for this document includes CIOs, CISOs, information security staffs, system administrators and all other relevant parties involved in the maintenance of the IT infrastructure or safeguard of information in an organisation. 1.3 Document Structure This document is organised into the following sections: Section 1 provides an overview on the document s content, the targeted audience and the document s structure. Section 2 gives background on Bring Your Own Device (BYOD). Section 3 presents the risks of Bring Your Own Device in an organisation. Section 4 gives a description of Mobile Device Management (MDM), the recommendations for choosing one, step by step deployment of an MDM solution and a sample of a Mobile Device Security Policy. Section 5 concludes the document. Section 6 consists of a list of references that have been used in this document. Appendix A provides a list of acronyms that have been used in the document. Guideline on Safe BYOD Management P a g e 4

5 2.0 Background Nowadays the business environment is fast moving and companies that are able to provide their employees with rapid and convenient ways to access corporate data and systems through the use of mobile devices have the potential to boost efficiency and business agility. However, even with the significant benefits of enterprise mobility, there are security issues such as leakage of corporate data, malware infection and hacker threats that need to be address so that the business mobile access initiative does not compromise the corporate systems, data and abide by the company s policy. Since there is a growing interest in BYOD (Bring Your Own Device) whereby employees are allowed to use their own mobile devices such as tablets, smart phones and laptops, there has been a lot of focus on the additional benefits that BYOD can bring to both employers and employees. The benefits of using personally owned devices for mobile access include: There is an increase in productivity and innovation since the employees are more comfortable with their personal device and become expert in using it. Personal devices tend to be more cutting-edge, so the enterprise benefits from the latest features. Also users upgrade to the latest hardware more frequently. BYOD shifts the cost towards the user where the employees have to pay for the mobile devices and data services resulting in reduce hardware cost for the organisation. Better employee satisfaction through the freedom of choosing their own device and allowing them to do so helps them to avoid carrying multiple devices. Guideline on Safe BYOD Management P a g e 5

6 3.0 The Risks of Bring Your Own Device (BYOD) Usually businesses will not run their IT infrastructure without the proper security technologies in place. Unfortunately, businesses and their employees are less aware of the security risks and the issues associated with corporate use of mobile devices. People often get the impression that the only inconvenience of losing a mobile phone is the loss of a list of contact details and in no case will affect the security of their employer. But with today s fast changing technology landscape this is not the case anymore as the features of mobile devices have changed to become a small and powerful computing device with network connectivity. The list below defines the hardware and software features of a mobile device. Mobile phones have at least one wireless network interface for Internet access. The technology normally used for this interface includes Wi-Fi, cellular networking such as General Packet Radio Service (GPRS), 3G and 4G, or other technologies that connect the mobile device to network infrastructures with Internet connectivity. High capacity built-in and removable data storage. An operating system that is not a full-fledged PC operating system but still offers a lot of functionalities. Applications which are available through multiple methods such as from app stores or third parties. Features for synchronising local data with a remote location (desktop or laptop computer, organisation servers, telecommunications provider servers, other third party servers, etc.). One or more digital cameras. Microphone. 3.1 An Alternate Way for Malware to Penetrate the Corporate Network Businesses are likely to have implemented security that protects all endpoints within their corporate network including firewalls that prevent unauthorised external access to corporate systems. Allowing smartphones and other mobile devices to access business systems and data mean that these devices will bypass the firewall. In case that those devices are infected with viruses or Trojans, that will introduce security issues within the corporate network. Guideline on Safe BYOD Management P a g e 6

7 3.2 Hacker Threats Hackers are always on the lookout to exploit unpatched vulnerabilities within operating systems and commonly-used applications, in order to gain control of mobile devices and steal sensitive data such as passwords or corporate propriety data. In the event that employees connect their mobile devices to their corporate desktops or laptops there are risks that data might be stolen. 3.3 BYOD Brings More Complexity to IT Management Nowadays, an employee may be using two or three mobile devices for accessing the corporate network. The challenge for the IT and security departments are to implement strategies to manage mobile security across wide range of devices and operating systems, such as: Android ios Windows Phone Blackberry Symbian 3.4 Corporate and Personal Data Mix on One Device There is always a possibility of security risks when personal data and corporate data are stored on the same mobile device. For example, a user may be downloading an infected game app for personal use and this could infect corporate data found on the mobile device. Another example is when an employee leaves the company; it can be difficult for the business to remove corporate data from the device without affecting the employee s personal data. 3.5 Loss of Mobile Device The greatest strength of mobile devices is also one of its major weaknesses. Since smartphones and tablets are so small and lightweight, they are convenient to carry around for easy access to corporate data. However, their size and weight also means the devices can be loss easily or fall into the wrong hands of criminals or thieves. Guideline on Safe BYOD Management P a g e 7

8 3.6 Risks from Other Devices Another risk in a company that is operating a BYOD scheme is when some employees will be syncing their mobile devices with their home PCs or Macs. This can introduce an additional risk of data leakage. Even though the employee is only interested in backing up his/her personal files and photos, they could also be downloading corporate data and passwords from their mobile device onto their computer as part of the sync process. In case that the employee s home computer has already been infected by Trojans or spyware, this could compromise the security of corporate data. Moreover, if the computer is not properly protected and patched, cybercriminals could easily access the mobile data stored onto the computer regardless of the security software that is actually running on the mobile device. Guideline on Safe BYOD Management P a g e 8

9 4.0 Mobile Device Management (MDM) As previously mentioned in section 3 the loss or theft of a device is a major risk factor, given the relatively weak control that an organisation may have over a device that is own by an employee. Therefore for the successful deployment of BYOD steps should be taken in advance in order to ensure some sort of data management on the employees personal devices. The proliferation of different mobile platforms brings about more complexity and using a software known as Mobile Device Management (MDM) can give some assurance about the confidentiality of data stored on the device and provide monitoring features. This section considers different aspects of MDM by first giving an explanation on what is MDM, how a MDM operates, recommendations on choosing a MDM solution, step by step implementation of a MDM and lastly a sample of a Mobile Device Security Policy. 4.1 What is MDM? According to Gartner, Mobile Device Management (MDM) includes software that provides the following functions: software distribution, policy management, inventory management, security management and service management for smartphones and media tablets. MDM functionality is similar to that of PC configuration life cycle management (PCCLM) tools; however, mobile-platform-specific requirements are often part of MDM suites. 4.2 Components of MDM There are currently two basic approaches to Mobile Device Management, the first one is to use a messaging server s management capabilities (usually from the same vendor that makes a particular brand of phone) or use a product form a third party. With the latter approach it is possible to have a single product that can manage multiple brands of phones for use within an enterprise. However, a MDM product provided by a phone manufacturer may have more features or robust support for the mobile devices than third party products. The architecture of both Mobile Device Management solutions are quite similar and the typical solution is to have the client/server architecture. The organisation will have one or more servers that will provide the centralise management capabilities, and usually one client applications will be installed on each mobile device and configured to run in the background at all times. In the event that the device is issued by the organisation, the client application will manage the configuration and security of the whole device. If the device is BYOD, the Guideline on Safe BYOD Management P a g e 9

10 client application will manage only the configuration and security of itself and its data and not the entire device. Typically, the client application and data are essentially sandboxed form the rest of the device s applications and data, this helps in protecting the organisation from a compromised device. 4.3 Mobile Device Lifecycle Management A six-phase lifecycle model is generally used to help organisations in the setting up of a MDM solution. The phases of the life cycle are as follows: Phase 1: Configure. In this phase, the mobile device, application settings and restrictions are going to be configured according to the security policy of the organisation. Phase 2: Provision. In this phase, provisioning facilitates automated and over-the-air (OTA) user device registration and distributing configuration check and evaluates software package distribution. Phase 3: Security. At this stage the device, apps and data are secured by enforcing security measures authentication and access policies, enable or disable device functionalities, blacklisting and whitelisting apps. Phase 4: Support. The support phase is to help users by remotely locating any device and also provide troubleshooting services. Phase 5: Monitor. The monitor phase is to keep a track on the device, app and data usage; check unauthorise user access; abnormal device behavior including remotely lock, wipe and selectively wipe devices. Phase 6: De-activate. In this phase, lost or stolen devices are decommissioned, user access is blocked and data is wiped out from compromised devices. The figure below shows a typical Mobile Device Management (MDM) architecture. Guideline on Safe BYOD Management P a g e 10

11 Figure 1: MDM Architecture 4.4 When is MDM Required? Whether to adopt an MDM solution depends on many factors. Firstly, there is a need to determine the type of devices, apps which are being used in the organisation and also the kind of data that are being accessed through them. An MDM solution may not be necessary in case the employees are provided only with BlackBerry or ios devices or in the event the devices do not access critical data. But, in a BYOD environment wherein employees bring devices with different types of OS like Android, ios, Windows, Blackberry, etc. then a MDM solution becomes a necessity to manage those devices and to protect the data from being compromised. Guideline on Safe BYOD Management P a g e 11

12 Figure 2: MDM Requirement Quadrant 4.5 Guidance for Selecting a MDM Solution Making sure to select the right MDM platform is critical because of security implications and high cost involved. Below is a list of points to consider for choosing a MDM platform: Mobile Policy: The MDM platform should best cater for the organisation s mobile policy i.e. it must have sufficient functionalities to cater for the level of security that the organisation needs. Security Mechanisms: Making sure that the MDM platform supports advanced data security measures and follows best practices is very important. Compliance: The MDM platform should be able to help in fulfilling compliance and regulatory obligations related to data security, customer privacy, etc. Remote configuration & control: The MDM platform should allow remote configuration, updating of OS and apps. Furthermore, it should enable remote control features such as locking and wiping of mobile devices in case of loss and theft. Scalability: The types of platforms and devices that the MDM platform can support are key considerations and also the ability to cater for more devices and platforms in the future. Guideline on Safe BYOD Management P a g e 12

13 Analytics: The MDM platform must have the capability of providing real-time, comprehensive analytics on registered devices and apps. 4.6 MDM Solutions There are several MDM solutions that are currently available on the market, figure 3 below shows Gartner Magic Quadrant for Mobile Device Management Software by classifying them into categories of niche players, challengers, visionaries and leaders. Figure 3: Gartner Magic Quadrant for Mobile Device Management Software 4.7 Deploying a MDM Solution For the purpose of this document the Cisco Meraki was used to show the basics in deploying a cloud based MDM solution. Cisco Meraki is a MDM solution that is free and has most of the core features that are usually required. Guideline on Safe BYOD Management P a g e 13

14 Cisco Meraki MDM Setup To setup Cisco Meraki an account has to be created on where you will be asked to fill out some basic information before you are redirected to the cloud GUI dashboard. Device Enrollment Figure 4: Cisco Meraki GUI Dashboard Cisco Meraki MDM support different platforms such as ios, Windows, Android, OS X and Chrome for enrollment. For this demonstration an Android smartphone was used for enrollment. Firstly, download the Systems Manager app from Google Play and install it on the smartphone and afterwards enter the code specific to your deployment. Figure 5: Downloading Android App Guideline on Safe BYOD Management P a g e 14

15 Figure 6: Enrolling Android Smartphone Managing Devices Figure 7 below shows the GUI dashboard of Cisco Meraki and also that the smart phone has correctly been enrolled. Figure 7: Cisco Meraki Client List Dashboard Figure 8 shows the client details such as OS version, MAC address, IP address and the list of apps that are installed. There is also the possibility of executing commands such as performing selective or full wipes or enforce security by enabling password strength and Geofencing. Guideline on Safe BYOD Management P a g e 15

16 Figure 8: Client Details Guideline on Safe BYOD Management P a g e 16

17 4.8 Sample Mobile Device Security Policy This sample policy provided below is intended to act as a guideline for organisations looking to implement or update their mobile device security policy. IT requirements 1. Devices must use the following Operating Systems: Android 2.2 or later, ios 4.x or higher. <add or remove as necessary> 2. Devices must store all user-saved passwords in an encrypted password store. 3. Devices must be configured with a secure password that complies with <Company X> s password policy. This password must not be the same as any other credentials used within the organisation. 4. With the exception of those devices managed by IT, devices are not allowed to be connected directly to the internal corporate network. User requirements 1. Users must only load data essential to their job onto their mobile device(s). 2. Users must report all lost or stolen devices to <Company X> IT immediately. 3. If a user suspects unauthorised access to company data via a mobile device, they must report the incident in alignment with <Company X> s incident handling process. 4. Devices must not be jailbroken or rooted* or have any software/firmware installed designed to gain access to prohibited applications. 5. Users must not load pirated software or illegal content onto their devices. 6. Applications must only be installed from approved sources such as Google Play or the Apple app store. Installation of apps from un-trusted sources is forbidden. If you are unsure if an application is from an approved source, contact <Company X> IT. 7. Devices must be kept up to date with manufacturer or network provided patches. As a minimum patches should be checked weekly and applied at least once a month. 8. Devices must not be connected to a PC without up-to-date and enabled anti-malware protection or which does not comply with corporate policy. 9. Devices must be encrypted in line with <Company X> s compliance standards. 10. Users must be cautious about the merging of personal and work accounts on their devices. They must only send company data through the corporate system. If a user suspects that company data has been sent from a personal account, either in body text or as an attachment, they must notify <Company X> IT immediately. Guideline on Safe BYOD Management P a g e 17

18 11. (If applicable to your organisation) Users must not use corporate work stations to back up or synchronise device content such as media files, unless such content is required for legitimate business purposes. *Jailbreaking (ios) and rooting (Android) refers to removing restrictions imposed by the manufacturer. This gives a user access to the operating system to unlock features and install unauthorised software. Guideline on Safe BYOD Management P a g e 18

19 5.0 Conclusion The massive adoption of the Bring Your Own Device (BYOD) culture in organisations is posing serious problems to IT departments in securing sensitive corporate data. Furthermore, with a huge array of different devices and platforms, it has become very difficult and resource consuming to control devices, apps and their usage. This is why a Mobile Device Management (MDM) solution is becoming a necessity for organisations to mitigate business risks and to centrally control and monitor in real-time the mobile environment. Guideline on Safe BYOD Management P a g e 19

20 6.0 References NIST, Guidelines for Managing and Securing Mobile Devices in the Enterprise, csrc.nist.gov Australian Signals Directorate, asd.gov.au/publications Kaspersky, Security Technologies for Mobile and BYOD, kaspersky.com/business Ernst & Young, Bring Your Own Device, ey.com Gartner, Mobile Device Management, gartner.com/it-glossary Sophos, Sample Mobile Device Security Policy, sophos.com Xcubelabs, Mobile Device Management, xcubelabs.com Guideline on Safe BYOD Management P a g e 20

21 Appendix A List of Acronyms BYOD MDM CIO CISO Wi-Fi GPRS 3G 4G OTA GUI OS MAC IP Bring Your Own Device Mobile Device Management Chief Information Officer Chief Information Security Officer Wireless Fidelity General Packet Radio Service Third Generation of Mobile Telecommunications Technology Standard Fourth Generation of Mobile Telecommunications Technology Standard Over-the-air Graphical User Interface Operating System Media Access Control Internet Protocol Guideline on Safe BYOD Management P a g e 21

Sample Mobile Device Security Policy

Sample Mobile Device Security Policy Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

6 Things To Think About Before Implementing BYOD

6 Things To Think About Before Implementing BYOD 6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices

More information

Mobile Security BYOD and Consumer Apps

Mobile Security BYOD and Consumer Apps Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Mobile Device Management

Mobile Device Management 1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

State of Mobility Survey. France Results

State of Mobility Survey. France Results State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:

More information

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360. MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

SecuRity technologies for mobile and Byod.

SecuRity technologies for mobile and Byod. SecuRity technologies for mobile and Byod. Executive summary 1.0 the mobile challenges The volume of new malware that is specifically targeting mobile devices is growing at an almost 1.1 increasing threat

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?

www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready? www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready? Why is this important to you? Background Enterprise mobility through Bring-Your-Own-Device (BYOD) has been around for

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

A framework for auditing mobile devices

A framework for auditing mobile devices A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. 2010 Baker Tilly Virchow Krause, LLP

More information

BOYD- Empowering Users, Not Weakening Security

BOYD- Empowering Users, Not Weakening Security BOYD- Empowering Users, Not Weakening Security Table of Contents Exec summary... 3 Benefits of BYOD... 4 Threats that BYOD Harbours... 5 Malware... 5 Data Leakage... 5 Lost or Stolen Devices... 5 Public

More information

security technologies For MobiLe AnD byod global security IntellIgence

security technologies For MobiLe AnD byod global security IntellIgence global security IntellIgence security technologies For MobiLe AnD byod essential security technology options for protecting enterprise networks, systems and data #enterprisesec kaspersky.com/enterprise

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Mobile Madness or BYOD Security?

Mobile Madness or BYOD Security? Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Kaspersky Security for Business

Kaspersky Security for Business Kaspersky Security for Business Licensing Program Renewals and Upgrades: A Migration Guide Introducing Kaspersky s Security for Business software licensing program. Table 1: Renew and Upgrade to Increased

More information