Vulnerability Management for. Mobility. Issue 2. Identify Mobility Risk through Mobile Device Visibility and Vulnerability Assessment
|
|
|
- Crystal Bridges
- 10 years ago
- Views:
Transcription
1 Issue Vulnerability Management for Mobility From the Gartner Files: Four Ways to Close the Gap Between Enterprise Mobility and Vulnerability Management About Tenable Network Security Vulnerability Management for Mobility Identify Mobility Risk through Mobile Device Visibility and Vulnerability Assessment Vulnerability Management for Mobility The modern enterprise is highly dependent on mobile devices to keep pace with business demands and to maintain a competitive edge. However, mobile devices remain a key challenge in the security risk they pose. Why? The deployment and management of mobile devices lies in the network operations team, and security teams may not be involved in the decision process. As a result, the business drivers for mobile devices may outweigh security concerns. Mobile devices connect and disconnect from the corporate network ad-hoc. Because of this, they may not be visible to traditional vulnerability scans. With Bring Your Own Device (BYOD) deployments any operating system or application may be running on the mobile device, adding another layer of complexity. The proliferation of mobile devices has increased the volume of threats and vulnerabilities that target these devices. Organizations must consider a holistic approach to bring together mobile device visibility and vulnerability assessment. To address these concerns, enterprises should include mobile device assessment (MDM) as part of their vulnerability management offering. However, there is no single template for mobile device vulnerability assessment since organizations have various types of mobile devices, various ways of managing these devices, and the mobile devices themselves are sensitive to security software installed. As a result, choosing a vulnerability assessment solution that addresses these needs and that works with existing IT investments is critical to provide the maximum flexibility and fullest visibility of mobile risk. The following research outlines how vulnerability management solutions are capturing the risk from mobility, what technologies are used to assess mobile devices, and which vulnerability management vendors offer the broadest coverage. Featuring research from
2 2 Of the vendors evaluated, Tenable Network Security offers one of the broadest mobile device assessment coverage that includes: Enterprise Mobility Management Integration including Apple Profile Manager, AirWatch, Good for Enterprise, and MobileIron ActiveSync Integration with Microsoft Exchange ActiveSync Passive Vulnerability Scanning Together these technologies allow Tenable Network Security to: 1. Enumerate ios, Android-based, and Windows Phone devices accessing the corporate network 2. Provide detailed mobile device information, including serial number, model, version, timestamp of last connection, and the user 3. Detect known mobile vulnerabilities, including out-of-date versions of Apple ios 4. Discover jailbroken ios devices Read this Gartner research to understand more about the benefits of integrating mobile device assessment into your vulnerability assessment program, and the capabilities provided by Tenable Network Security. Source: Tenable Network Security
3 3 From the Gartner Files: Four Ways to Close the Gap Between Enterprise Mobility and Vulnerability Management Mobile device coverage in vulnerability assessment solutions has not kept pace with mobile device adoption in the enterprise. This has resulted in a growing gap in oversight for security organizations. Here are four options for closing that gap. Key Challenges Mobile and bring your own device adoption in the enterprise continue to increase, but security organizations are not yet including them in vulnerability management programs. Traditional vulnerability assessment solutions and methods provide only minimal support for mobile device assessment, complicating the process of including them in the vulnerability assessment workflow. Without including mobile devices, security organizations are failing in maintaining responsibility and oversight. Security organizations must address the organizational issue that IT and mobile systems are typically managed by distinct organizations. Recommendations IT security managers: Expand the scope of vulnerability management programs to include mobile devices in addition to traditional devices. Assess, select and implement the most suitable best practice for your organization from the ones presented in this research for integrating mobile devices into the vulnerability management workflow. Make mobile device assessment capabilities a core requirement for vulnerability assessment product selection. Strategic Planning Assumptions By 2019, 80% of vulnerability assessment (VA) vendors will offer enterprise mobility management (EMM) integration capabilities to assess mobile devices, up from 20% today. By 2017, 40% of enterprises will deploy or extend their VA solution to cover smartphones and tablets, up from 5% today. Introduction The adoption of mobile devices in the enterprise has increased year for year, 1 in the case of bring your own device (BYOD) with 62% of employees already using theirs for work purposes. 2 While the usage of EMM (see Note 1) and MDM solutions has grown, these rarely include a focus on vulnerability management in terms of functionality, as EMMs are usually bought and operated by nonsecurity actors, such as IT operations. Integration of VA and management solutions has not kept up pace with the fast growth of enterprise mobility, and VA vendors are behind this curve, leaving organizations to fend for themselves. The consequence is that smartphones, tablets and other mobile devices are not being included in VA and management programs. This has created a gap in the ability of IT security organizations to gain a centralized, environmentwide view of the true risk and security posture. This hole can only grow wider as mobility becomes a fundamental component of an enterprise. The purpose of this research is to provide four possible alternative approaches and best practices to plug this gap and consolidate VA and management for mobile and traditional devices. Analysis Vulnerability management has grown and evolved over the past decade, with standardized workflows, a shared terminology and a number of
4 4 vendor-independent standards, such as Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS), and Common Vulnerability Reporting Framework (CVRF). VA solutions have both adopted and helped formalize these further, and provide the technological framework for most vulnerability management programs. In addition, other technologies from the security ecosystem have adapted to the same standards and offer interoperability with these (e.g., security information and event management [SIEM]) solutions. Traditional vulnerability scanning methods rely on network-based assessments that can connect to a given target via an IP address, interrogate open ports and services, and authenticate remotely. Alternatively, some solutions utilize an installed local agent. In the case of mobile devices, both of these methods pose challenges. Caution is advised when vendor offerings claim to support mobile devices such as smartphones and tablets based on IP-scanning, as it is neither a reliable nor an effective means of assessment. Mobile devices are not designed to provide remote authentication via the network, nor do they as a general rule offer network services to remotely assess. Installing agents requires an entirely different infrastructure and approach than traditional computer systems. EMM systems, with a shorter history and experience in commercial environments, have rapidly entered the enterprise space. Unlike traditional endpoint protection platforms, EMM tools have focused on managing and securing enterprise mobile devices by enabling them, rather than locking them down. As the buying center for EMM tools is usually closer to IT operations than IT security, VA support has not been the focus of EMM tools so far. VA vendors have slowly begun adding capabilities to bridge this gap, with ActiveSync and EMM integration the most widely encountered features, and a few maverick vendors providing direct assessment methods. By integrating mobile device management (MDM) technology with vulnerability management, the security organization regains visibility and oversight back over the rapidly growing population of mobile-based assets. This allows mobile devices to be included in risk metrics and reporting, as well as enabling the assessment and management of mobile device vulnerabilities by the IT security organization. Option No. 1: Direct Mobile Vulnerability Assessment In direct mobile VA, the VA solution gathers security information locally from the mobile endpoint, usually via an agent in app form. A common approach is to publish the agent app via an official app store (i.e., Google Play Store), allowing end users to install the application themselves. The agent app can then be configured with connection and authentication credentials for a centralized management platform, usually cloud-based, to couple it with the VA solution. This particular method is also suited to a BYOD selfservice model. A native agent app can provide bidirectional communication for direct management by the security organization, for example to schedule scans and audits as required, and to execute scans based on custom profiles. The local system access that an agent app provides also permits deeper security audits, including on application permissions and configuration settings. Benefits A locally installed app directly gathers securityrelevant information, instead of relying on operational data and inference. Deep security assessments are possible due to direct system access. Detailed vulnerability findings and asset inventory data are directly integrated into enterprise vulnerability and risk metrics and reporting. Bidirectional integration occurs the app can be directly managed by the security organization. Challenges It requires the installation and management of a local agent application, and this challenge is compounded as the number and variety of mobile devices increases. It s Android only; ios s security model severely limits the necessary functionality. Mobile devices must be able to connect back to the VA management interface, necessitating either an external service to be exposed on the
5 5 perimeter, or a cloud-based model providing a centralized public management point. It requires access to mobile endpoints by involvement of both the mobile management and VM teams. There is currently only a limited selection of available solutions offering this capability. Sample vendors BeyondTrust: Retina CS for Mobile is a native mobile VA solution that offers Android device VA via an agent available from Google Play Store. The solution fully integrates with Retina CS for consolidated VA. Secunia: Secunia offers the free PSI for Android client on the Google Play Store. The PSI can scan for missing patches and vulnerable applications, and provides alerting and app update features. The PSI agent can be configured to integrate with the latest release of Secunia s cloud-based vulnerability and patch management offering, Secunia CSI 7. Option No. 2: EMM Integration A small number of VA and management solutions provide the ability to integrate and communicate with third-party EMM solutions. By authenticating to the EMM and utilizing APIs, they are able to access, for example, device and application inventory data, such as the manufacturer, OS and installed application versions. Coverage is not mature, with VA solutions commonly only supporting a small subset of available third-party offerings, with varying depths of integration. For example, some EMMs apply reputational intelligence to installed apps and maintain other vulnerability and patch information, but not necessarily in a format useful or exportable to a VA solution. In addition, EMM vendors are currently trying to rapidly enrich their suites with enablement features, making integration with VA a secondary item in their road maps. Benefits It reuses already existing agent infrastructure from EMM. It permits at least a partial view into securityrelevant mobile device data, without the need to gain access to every mobile endpoint. Vulnerability findings and asset inventory data are directly integrated into vulnerability and risk metrics and reporting. Challenges VA solutions only support a subset of EMMs. APIs and asset data formats are not standardized, so that unique integration APIs have to be created for every EMM vendor to be coupled. This restricts choice if integration is a stringent requirement. The depth and scope of data that is exportable is limited in comparison to native assessment. Very basic implementations will only populate device type (i.e., Android, ios) and the firmware version, allowing only a superficial assessment. Integrations not based on strategic technological vendor partnerships may not be further developed and matured in the future in both the VA and the EMM solution. Vendors must be carefully vetted for future plans in this regard. Most implementations are unidirectional and can only fetch device information from the EMM and not initiate assessments or change audit policies. Sample Vendors Tenable Network Security: Tenable s Nessus and SecurityCenter can integrate with Good for Enterprise and Apple Profile Manager to gather such information as OS version, model, serial number and similar device data. McAfee: McAfee Enterprise Vulnerability Manager can be integrated with McAfee Enterprise Mobility Management via McAfee epo. BeyondTrust: Retina CS integrates with BlackBerry BES to gather device data.
6 6 Option No. 3: ActiveSync (EAS) Integration Certain mobile solutions are installed on the Exchange Client Access Server and perform VA by comparing device information with vulnerability databases. These solutions leverage the Microsoft Exchange ActiveSync (EAS) protocol that provides synchronization of data such as s and contacts between the Exchange server and mobile devices, as well as mobile device policy enforcement. EAS has the advantage of being ubiquitous, as it is inbuilt in most modern mobile devices. However, it lacks structure and granularity as the number of policies is limited (e.g., jailbreak detection is missing) and each mobile device supports a different subset of those policies. EAS-based solutions are a lightweight option for organizations that either do not yet have an EMM in place, or have not worked with the department deploying the EMM to cover VA functionality, and need a quick fix to this. Benefits It integrates with existing Windows/exchange infrastructure. It does not require additional external services to be exposed. It s the most commonly supported method across VA solutions and mobile OSs, as it leverages the broad third-party device coverage that EAS provides. Challenges ActiveSync does not yet provide full-fledged EMM capabilities, and these same limitations limit the data available to VA solutions. Security-relevant information is only partially available. VA vendor EAS integration implementations must be continuously developed to maintain lockstep with new EAS releases and leverage new features, so vendors must be assessed for their ongoing commitment. Support for cloud-based (e.g., Office 365) and third-party EAS implementations (e.g., Lotus) varies. Sample vendors BeyondTrust Retina CS and Tenable Network Security offer this capability. Option No. 4: Passive Vulnerability Scanning Passive vulnerability scanning (PVS) inspects network traffic on the wire to identify vulnerabilities based on heuristics, such as banner, session, and protocol information. An example is identifying a Web browser s version by inspecting the browser agent string sent when viewing a Web page. The technology can be used to identify device types, such as ios or Android devices, OS versions and some applications. The distinct advantage of PVS is that it is nonintrusive and requires no installation or configuration on the end devices. PVS can only provide limited visibility, as it relies solely on what is available in network traffic to infer pertinent information, such as the application name and version, and associated vulnerabilities. Practically, this means that it can only detect network-enabled applications that send and receive data, and only when they actively do so. Encryption, for example, can severely limit the effectiveness. PVS for mobile devices is useful as stopgap measure before implementing a more direct method for managed devices, or as an augmentation to more direct access to mobile devices. In the case of unmanaged or even rogue devices, it is the only method. It can either be implemented at the perimeter, or at the border between different network zones, to identify client vulnerabilities via their traffic. This requires mobile traffic to be routed to a network chokepoint on the network that will allow the inspection of all mobile traffic in one place (e.g., via a SPAN port). A good example would be between an organization s wireless LAN (WLAN) and the Internet. Mitigation can then take the form of either informing the device owner that he has to take remediation steps, or by actively blocking access to the network or specific resources for that device.
7 7 Benefits It s noninvasive; inspects traffic on the wire. It allows coverage of noncentrally managed devices requiring access to internal resources. It s a suitable stopgap measure when no other option is available. It adds additional features, such as activity monitoring and malware activity. Challenges Only vulnerabilities affecting applications that generate network traffic can be detected. It can only assess assets that traverse the company network infrastructure. It requires network chokepoints to centralize mobile traffic for inspection. Network encryption can greatly reduce the effectiveness. Sample vendor Tenable Network Security: Tenable offers the Nessus Passive Vulnerability Scanner (PVS). A Look Forward Two trends, the general growing proliferation of mobile devices such as smartphones and smartpads, as well as the increasing acceptance and adoption of BYOD policies within enterprises, will increasingly mandate that security organizations regain and maintain oversight over these. As the overall percentage of mobile devices in the enterprise asset population increases, so will the risks. VA vendors will strengthen and extend their capabilities with tighter partner ecosystems and integrations between VA and EMM technologies, especially for on-premises and remote scanning solutions, where roaming agent support and the associated infrastructure are not feasible. Relying on the EMM capabilities will make any improvement in functionality dependent on parallel improvements in the EMM. As for many mobile implementations, cloud-based deployments for VA solutions intended to also assess mobile devices have a true advantage with respect to alternatives. We have seen this with secure Web gateways as well as with data loss prevention (DLP) tools. However, as with secure Web gateways (SWGs) or DLP, efficient cloudbased implementations are still far away from being a reality. Cloud and SaaS offerings will be in the vanguard of fully native, direct mobile VA, and will increasingly add functionality that will directly compete with EMM offerings. EMM vendors will also align more closely with common vulnerability and risk management standards and practices, adding more security capabilities and features themselves. The ability to leverage their already existing agent infrastructure provides an ideal foundation for this. This will also simplify tighter integrations with VA solutions. We are already seeing this trend, with vendors such as Lacoon and Skycure offering pure-play mobile security products that bridge this gap. As enterprise mobility keeps maturing and network performance will keep improving, these issues will be increasingly easier to solve and bring mobile VA to the mainstream. Additional research contribution and review were provided by Anton Chuvakin.
8 8 Appendix Table 1. Vendor Options Vendor Native Mobile Assessment EMM Integration BeyondTrust Retina CS X 1 X 2 X McAfee Enterprise Vulnerability Manager X 3 EAS/ ActiveSync Rapid7 Nexpose * ** Tenable Nessus/ SecurityCenter Secunia CSI/PSI X 1 X 4 X X Qualys ** PVS * Rapid7 offers a SaaS mobile security solution called Mobilisafe. There are plans to integrate Mobilisafe with Nexpose ** Via integration with Cisco Sourcefire 1 Android agent 2 BlackBerry BES; MobileIron is being planned 3 McAfee EVM integrates with McAfee Enterprise Mobility Management via McAfee epo 4 Good for Enterprise Source: Gartner (April 2014) Acronym Key and Glossary Terms BYOD Bring your own device EAS Exchange ActiceSync EMM Enterprise mobility management Evidence 1 Forecast Analysis: Devices, Worldwide, 4Q13 Update 2 User Survey Analysis: Is Bring Your Own Device Job Essential or a Personal Preference? MDM PVS VA VM Mobile device management Passive vulnerability scanner/scanning Vulnerability assessment Vulnerability management Note 1. MDM/EMM This note refers to mobile device management solutions as enterprise mobility management throughout the document. Gartner Research Note G , Oliver Rochford Dionisio Zumerle, 30 April 2014
9 9 About Tenable Network Security Founded in 2002, Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Relied upon by more than 24,000 organizations around the world, Tenable s key clients include Fortune Global 500 companies across industries as well as the entire U.S. Department of Defense and many of the world s leading governments. Our family of products includes SecurityCenter Continuous View and Nessus. SecurityCenter Continuous View allows for the most comprehensive and integrated view of network health. Nessus is the global standard in detecting and assessing network data. With the largest install base and best expertise in our industry, Tenable gives customers the ability to identify their biggest threats and respond quickly. In 2014 Tenable was selected as a Red Herring Top 100 North America award winner. The company was also named Best Vulnerability Management Solution at the SC Magazine Europe awards. Tenable has been selected as a Deloitte Technology Fast 500 Company every year since Our Mission Tenable founders Ron Gula, Renaud Deraison, and Jack Huffard build technology that secures and protects any device from threats on the Internet malicious software, hackers, viruses, and more. Tenable wants its customers and every company to have access to the latest and best technology that will ensure they stay connected, online, and in business. For more information, contact Tenable. Vulnerability Management for Mobility is published by Tenable Network Security. Editorial content supplied by Tenable Network Security is independent of Gartner analysis. All Gartner research is used with Gartner s permission, and was originally published as part of Gartner s syndicated research service available to all entitled Gartner clients Gartner, Inc. and/or its affiliates. All rights reserved. The use of Gartner research in this publication does not indicate Gartner s endorsement of Tenable Network Security s products and/or strategies. Reproduction or distribution of this publication in any form without Gartner s prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website,
Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)
Nessus and Mobile Device Scanning November 7, 2014 (Revision 12) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 Scanning for Mobile Devices with Nessus... 4 Creating a
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
Paul Cochran - Account Manager. Chris Czerwinski System Engineer
Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
Bring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.
Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Review: McAfee Vulnerability Manager
Review: McAfee Vulnerability Manager S3KUR3, Inc. Communicating Complex Concepts in Simple Terms Tony Bradley, CISSP, Microsoft MVP September 2010 Threats and vulnerabilities are a way of life for IT admins.
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean
Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods
ForeScout CounterACT Endpoint Contents Introduction.... 3 Overview of ForeScout CounterACT... 3 Overview of Discovery and Inspection... 4 Host & Network Device Discovery... 4 Endpoint Detection & Inspection
How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
BEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Secunia Corporate Software Inspector (Secunia CSI) ver.5.0
TECHNOLOGY AUDIT Secunia Corporate Software Inspector (Secunia CSI) ver.5.0 Secunia Reference Code: OI00070-107 Publication Date: December 2011 Author: Andy Kellett SUMMARY Catalyst Organizations need
Bell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
