Fear and Loathing in BYOD
|
|
|
- Erick Cross
- 10 years ago
- Views:
Transcription
1 A SANS Analyst Survey Written by Joshua Wright Advisor: Chris Crowley December 2013 Sponsored by Trusted Computing Group 2013 SANS Institute
2 Introduction It s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previously inaccessible with legacy devices. The modern workforce is demanding mobile device access to business data, and the potential benefits to enterprise networks granting this access are many. Simultaneously, attackers are identifying new opportunities and benefits associated with exploiting mobile devices and applications. From simply stealing a device to perpetrating complex traffic-manipulation exploits, attackers are getting better at leveraging the mobile device compromise opportunities for their financial gain. On-phone data exploitation, along with theft of passwords, VPN and other access credentials, and remnants of sensitive data are all of value to attackers and their automated malware programs. And while these devices may contain limited information, their access to and other corporate accounts make them a perfect entry point to compromise previously inaccessible networks. These are trends backed up by the SANS 2nd Survey on BYOD (Bring Your Own Device) Security Policies and Practices, which was taken by 576 IT professionals during the months of October and November in The long-term mobile device security threats reported by IT professionals in this survey stem from insufficient technical enforcement to support of basic controls such as device management, monitoring or policy enforcement. The survey exposes plenty of fear and loathing by IT professionals in the BYOD space. The purpose of this survey was to understand mobile device security trends and to identify the techniques organizations are adopting to mitigate threats associated with mobile devices and BYOD. The professionals who took this survey represent the front lines of IT, setting policy for mobile device use, managing deployments of mobile devices and tackling the tough technical challenges associated with meeting the mobile device operational requirements of end users while maintaining the security requirements of the organization. 1
3 Survey Participants In order to understand the results of the survey, it s vital to first understand the audience that participated in the survey. Although the largest group of respondents works for organizations in the government sector (21%), there is also ample representation from the financial, educational and health care industries. The mysterious Other category came in at second place with 15% and represents industries from religious groups to law enforcement agencies, agriculture to military, and entertainment to real estate. The distribution of industry participation in our survey is shown in Figure 1. What is your company s primary industry? 39 % Percentage of respondents involved in an international organization Figure 1. Respondent Industry Representation These results tell us that organizations of all types are dealing with BYOD deployments, as are organizations of various sizes. In our survey, 33% of respondents work at organizations with more than 10,000 employees. Another 30% represented organizations with a workforce between 2,000 and 10,000 employees, and the remainder represented organizations with fewer than 2,000 employees. Of these responses, slightly more than one-third of the organizations indicate that they are international organizations. 2
4 Survey Participants (CONTINUED) The survey targeted IT professionals who fulfill management, compliance or technical roles. Management and IT roles were fairly evenly distributed among the respondents. While the largest single group is IT security admin/analyst (41%), the second largest group was in IT security management (25%). Other IT management (17%) and a small number of compliance managers (5%) indicate that there was an equally strong representation of IT management in this survey as well. Of these, the vast majority of survey participants are employees of the organization rather than paid consultants, as shown in Figure 2. What is (are) your role(s) in the organization, whether as staff or consultant? 47 % Percentage of respondents in management at the director, manager or C levels Figure 2. Organizational Roles of Respondents Note that this was a multiple-choice question. From this data we can infer that many of the respondents have multiple roles, indicating as much on the survey. This distribution is also similar to the respondents roles in our 2012 policy survey
5 About Their BYOD Usage While most organizations today are allowing BYOD, the past two SANS surveys 2 have shown that the number of employees allowed to use their own devices for work purposes is relatively low but that number is growing. Of the respondents who said they have personally owned devices in their organizations workforce, the majority indicated that less than 20% of their organizations employees used personally owned devices for work in 2013, as illustrated in Figure 3. What percent of your workforce currently use their own devices for work? Figure 3. Personally Owned Mobile Device Use Still, this is an increase from the 10% of employees using personally owned devices reported by respondents completing the 2012 policy survey, 3 indicating that the BYOD trend is growing and taking hold inside organizations. 2 The first survey focused on BYOD usage: the second survey in 2012 focused on policy:
6 About Their BYOD Usage (CONTINUED) BYOD Access to Apps Not surprisingly, the number one business application for personally owned devices is corporate and intranet access, with 90% of the respondents indicating those applications are currently accessible to their BYOD workforce, as shown in Figure 4. Which of your organization s business applications are currently being accessed from a workforce member s personal device? Figure 4. Business Application Access from Personally Owned Devices These applications ( and intranet) were also the top applications accessed by BYOD users in our 2012 policy survey. In this year s survey, as in that survey, the next most-used application for mobile devices is accessing IT systems for administration and support, likely skewed by the roles and responsibilities of our survey respondents. Also popular were line of business (LOB) applications and productivity applications (including customer relationship management or CRM apps), which were also equally distributed across our 2012 survey. 5
7 About Their BYOD Usage (CONTINUED) Because legacy applications ranked so low on last year s survey, we asked an additional question this year about the work involved in modifying legacy apps for mobile custom or legacy applications. Interestingly, legacy or custom applications supported by the organization are not finding their way to mobile devices, with 37% of respondents denying legacy application access from mobile devices, as shown in Figure 5. Did any custom or legacy applications require modification to facilitate mobile device access? If you know how many apps required modification, please provide the number below. 33 % Percentage of respondents who had to modify custom or legacy apps to facilitate mobile device access Figure 5. Custom or Legacy Application Access These applications often represent the most sensitive data assets (simultaneously, the most valuable data assets for an attacker). It is possible that denying access to legacy applications may be part of a mobile device data isolation strategy to protect sensitive data, contributing to these results. 6
8 About Their BYOD Usage (CONTINUED) BYOD Platforms Overall, the Android platform has greater market share over ios for smartphones, while ios leads market share for tablets. This is particularly prevalent worldwide, with Android holding more than 79% of the market share of smartphone shipments in 2Q 2013 according to IDC. 4 However, in our survey results, respondents indicated that corporate data access from personally owned devices is primarily via Apple ios (36%), followed closely by Android (30%), as shown in Figure 6. What operating systems is your workforce using to access these resources? Check all that apply. 36 % Percentage using Apple ios devices to access corporate data Figure 6. Mobile Device Platform Use This contradiction could be explained by comparing the worldwide Android and ios adoption rates with smartphone buying habits. For many smartphone users, the selection of Android over ios is related to price, where Android is frequently a lessexpensive option and garners a much higher adoption rate particularly in worldwide developing markets. Contradictory to worldwide adoption reports, BlackBerry and Windows Mobile together made up 32% of mobile devices accessing corporate data in our survey
9 Risk Versus Policy The risk introduced by a BYOD workforce has not gone unnoticed by IT groups supporting or adapting to BYOD in their enterprises. The vast majority of respondents indicated that they are very concerned or somewhat concerned about the risk of personally owned devices to the organization (85%). The remaining 15% of respondents indicated they were not concerned about those risks or not even aware of the risks at this point, as illustrated in Figure 7. What is the perception of risk to your organization created by use of personally owned mobile devices? Figure 7. Perception of Risk Created by Personally Owned Mobile Devices Respondents primary concern was insufficient security controls for the platforms (77%), followed closely by a lack of BYOD manageability (73%). Legal concerns and user misuse also rate highly as a concern (64% and 63%, respectively), but mobile malware is a big concern, both from the perspective of infected mobile devices (65%) and from unauthorized accessibility into protected networks through mobile devices (55%), as shown in Figure 8. What are your concerns about BYOD accessing enterprise resources? Check all that apply. Figure 8. Enterprise Data Access Concerns from Personally Owned Devices 8
10 Risk Versus Policy (CONTINUED) The BYOD Divide The BYOD Divide is a concept organizations unknowingly adopt when they segregate any important data assets from mobile devices. Ultimately, this policy is destined to failure, as more users circumvent controls to access data on their mobile devices without organizational approval. The first choice, Insufficient security controls, presents a window for vendors and integrators serving this community. As they develop and automate more controls for supporting BYOD securely, vendors need to keep in mind the need for manageability and security controls on the endpoint, the network and at the application layer, as well as continual training for the human layer. Policy Alignment In our survey, respondents overwhelmingly indicated that their organizations are committed to making BYOD work, with more than 85% of respondents indicating that BYOD security is important, extremely important, or critical to their organization, as shown in Figure 9. What is the commitment of your organization to BYOD security? By segregating BYOD, organizations lose both visibility into devices and the capability to leverage the advantages of personally owned mobile devices. For many organizations, personally owned devices are already part of the network. Organizations should focus on enhanced data security through improved access control, data retention, logging and monitoring controls, not on completely prohibiting data access. Figure 9. Enterprise Commitment to BYOD Security From a security policy development perspective, BYOD drivers include protecting sensitive data, enabling access while protecting a mobile workforce and protecting the internal network from BYOD devices, as shown in Table 1. Ranking of Importance Table 1. Drivers of Policy for Personally Owned Devices Driver Protect sensitive data accessed by devices Enable a flexible, mobile, yet secure workforce Protect the internal network from BYOD threats Establish greater awareness of mobile threats and vulnerabilities Meet audit and compliance standards Reduce concern over VPN transport threats through mobile access Avoid costs associated with mobile breaches Enable changes in support strategies (i.e., outsourcing/cloud) Of somewhat less concern for most organizations is using mobile policies to meet audit and compliance standards for their organization. This could be a reflection of the organizations changing perception of personally owned mobile devices from tools of convenience to vital business assets. 9
11 Mobile Device Security Controls Recognizing that the majority of organizations are committed to personally owned mobile device security and that confidence is low in the effectiveness of their policies, it s time to examine the security mechanisms that are in place. We asked our survey participants what controls they have in place, with answer options that represent the industry options available to them today, including their controls for authentication, remote access, malware and hostile application controls. How are organizations protecting their systems and data from the new risks posed by BYOD? They re using two dubious methods: passwords and user education. Mostly Passwords From a device or app authentication perspective, most respondents are using passwords to protect against unauthorized access to data on mobile devices, as shown in Figure % What type of authentication confirmation do you have in place for mobile/byod users? What requirements do you plan to include within the next 12 months? Check all that apply. Percentage of organizations relying on passwords to protect against unauthorized access to data on mobile devices Figure 10. Mobile Device Authentication Controls Figure 10 also shows the plans for change with the introduction of more secure device authentication methods, such as one-time passwords or two-factor authentication, certificates, biometrics and more granular application authentication. The results are not dramatic: Biometric authentication mechanisms will increase from 6% to 10% as they become more available with the introduction of Touch ID on ios in the iphone 5S and future devices. One-time password/two-factor authentication is increasing only 3%. Device-specific certificate usage will increase by 7%, and granular, app-based authentication will increase by 4%. 10
12 Mobile Device Security Controls (CONTINUED) Although this growth in stronger authentication mechanisms is positive, the change is not significant enough to offset the risk in using password authentication for BYOD. Until we have a clear, easy-to-use alternative, passwords will likely continue to dominate authentication processes and put us at risk for acts perpetrated from user-owned devices. This is particularly true if passwords are the main authentication mechanism to SSL VPN, on which organizations are primarily relying to protect internal resources from potentially malicious BYOD access, as shown in Figure 11. In addition to using authentication, how else are you currently protecting remote access to your applications and data? Check all that apply. Until we have a clear, easy-to-use alternative, passwords will likely continue to dominate authentication processes and put us at risk for acts perpetrated from user-owned devices. Figure 11. SSL VPN Dominates Remote Access Controls VPNs are also being used as a sensitive data-protection mechanism by providing the means to create virtual sessions in which mobile devices are interacting only with applications, not transferring data to the phone. 11
13 Mobile Device Security Controls (CONTINUED) Over-Reliance on Users Using SSL VPN to protect the confidentiality of data transit over the network is the second most-used security mechanism in protecting sensitive data, with just over 40% of respondents selecting this answer. Above that, user education is the most widespread security protection mechanism used to protect data on mobile devices, with 48% leveraging user education for protecting sensitive data on BYOD. Disconcertingly, 23% of respondents report no policy exists to protect sensitive data when accessed by mobile devices, as shown in Figure 12. How is your sensitive data protected when accessed by mobile devices? Check all that apply. 23 % Percentage reporting having no policies to protect sensitive data on BYOD Figure 12. Controls to Protect Sensitive Data on Devices 12
14 Mobile Device Security Controls (CONTINUED) Android s Hostile App Evolution All major mobile device platforms have taken steps to mitigate mobile malware, though it is more challenging for Android. In contrast to Apple s ios policies, Android has been far more permissive in what is included in the Google Play store, commonly leading to malicious imposter applications or other mobile malware threats distributed through official app channels. In KitKat, the most recent version of Android (4.4), the platform has migrated to a default-on malicious code scan prior to application installation, using Google s cloud mobile malware scanning service. Unfortunately, it will be several years before this mechanism is leveraged in widespread deployment due to the fragmentation of the Android platform and the sluggishness of vendor deployment of Android platform updates. User education, followed by No protections, were also the dominant answer respondents cited for addressing hostile apps on mobile devices (including spyware and apps that aggressively collect data from mobile devices), as shown in Figure 13. How do you protect against potentially hostile user-installed applications on user-owned devices? Figure 13. Hostile Mobile Application Security Controls Almost 36% of organizations are using user education and awareness programs to defend against hostile app threats, while 35% of respondents have not deployed any controls to protect personally owned devices. 13
15 Mobile Device Security Controls (CONTINUED) Looking at Platform Controls User awareness and education programs help protect devices and data. However, organizations generally have to rely on platform controls embedded in user devices for security beyond the user s control. Surprisingly, nearly 54% of respondents indicated that they are somewhat confident in the effectiveness of security controls offered by modern mobile device operating systems, as shown in Figure 14. How confident are you in the effectiveness of the security controls that are being embedded into the newer mobile operating system(s) (OSes), such as ios 7, Android, BlackBerry, and Windows Mobile? Figure 14. Mobile Device Platform Security Control Confidence On a platform-specific basis, respondents felt that ios had the greatest effectiveness with security controls, followed by BlackBerry and Windows Mobile. The Android platform brought up the rear, garnering the least amount of confidence of security controls by the respondents (see Table 2). Table 2. Platform Security Control Effectiveness Embedded Security Control Ranking Mobile Operating System ios BlackBerry Windows Mobile Android This is not a great position to be in, seeing as how Android also holds the greatest market share. If enterprises are not managing those devices, the lack of effective embedded controls leads to a prevalent and persistent security challenge for supporting personally owned devices. 14
16 Mobile Device Security Controls (CONTINUED) Despite these results, one respondent summarized this author s feelings about this metric perfectly: As someone who has rooted/owned [mobile devices], I have little to NO confidence in the built-in controls. The quantity of security flaws resolved in each ios update alone are enough to dissuade many IT professionals from having confidence in the security of the ios platform. Over a seven-month period between the release of ios and ios 7, Apple fixed 80 security flaws, including long-standing vulnerabilities in compromised certificates that could be exploited by an attacker to harvest password credentials from mobile applications. 5 Many of these flaws were well-known to the attacker community and were actively exploited for months prior to Apple s release of fixes in ios 7. Across the board, respondents indicate that they are not confident with their existing mobile security policies today. The Android platform fares even more poorly. A widely exploited vulnerability in Android applications affecting even the most recent versions of the Android platform relating to the use of WebViews has yet to be publicly acknowledged or mitigated by Google. Security research group MWR InfoSecurity indicates that 62 out of the top 100 Google Play store apps are potentially vulnerable to command injection exploits, allowing an attacker to run arbitrary commands and execute arbitrary code on Android devices. 6 Confidence in Programs Across the board, respondents indicate that they are not confident with their existing mobile security policies today. This lack of confidence could be due to the relative newness of mobile security coverage. Well-known and well-used security mechanisms such as VPN garnered the greatest security confidence in respondents, whereas arguably the most effective security control for mobile access (separation of corporate and personal data and apps) has the lowest level of confidence (see Figure 15). How confident are you in your mobile policies as they exist today within your organization? Rate your confidence for those that apply to your organization and mark all others as N/A. Figure 15. Mobile Device Policy Confidence
17 Interpreting the Results The results of each individual survey question are interesting, but the overall results are much more valuable: Organizations are concerned about BYOD. Despite a business commitment to adopt BYOD, organizations are concerned about the security risks associated with mobile device use. A lack of manageability and visibility, as well as insufficient controls for mobile devices, top the list of concerns. Despite these concerns, few organizations have made the jump to widespread deployment of more sophisticated mobile device management and security systems. Lack of confidence in existing policy. Organizations are not confident in their existing policy and enforcement mechanisms for stemming the threat from mobile devices. Security controls such as VPN and mobile device network isolation remain the predominant protective mechanisms used, and fewer organizations leverage the more granular and sophisticated mobile enterprise security tools. As a result, organizations lose visibility into mobile device use within their workforce and unauthorized mobile device data access. Hostile applications go undefended. Most organizations are not prepared to defend against hostile application threats, having no defense mechanism or relying solely on user education and awareness training. Particularly for Android devices, malware development is increasing substantially, representing a growing attack vector and risk for organizations. Over-reliance on users. As the results show, the top method selected for protecting sensitive data and combatting malware is user education. User education is always necessary, but organizations cannot rely on end-user decision making to mitigate the numerous threats affecting mobile devices. Once we understand these limitations and risks, we can look at decisive steps for improving the security of personally owned mobile devices to safely enable a mobile workforce. 16
18 Interpreting the Results (CONTINUED) Application Scrutiny Organizations should prepare to respond to the issue of hostile mobile applications. Just as we leverage formal incident response and remediation procedures for malware on traditional computing platforms, organizations should leverage tools to identify hostile applications and reduce the threat of sensitive information disclosure through several steps: Organizations deploying mobile devices need to implement management and reporting mechanisms to understand where users are accessing data and identify risks and threats associated with that data. Wherever possible, leverage built-in application platform controls to mitigate the impact of malicious software. This should include using the platform and controls to train end users on mobile device application permission management. Don t just count on users, though; leverage built-in and third-party analysis services to identify malicious or threatening mobile applications and control inter-app data sharing through platform controls. Leverage third-party management tools to stop malicious software from accessing sensitive data through the use of containerized application security or remote access data solutions, for example. For critical applications, such as business productivity, enterprise resource planning and customer resource management applications, conduct penetration tests prior to production deployment to identify threats to the system. Mobile Device Management and Reporting Organizations deploying mobile devices need to implement management and reporting mechanisms to understand where users are accessing data and identify risks and threats associated with that data. At a minimum, such a reporting should capture the following: Device type and version information. What hardware and software platform is in use? Security patch level information. Is the device up to date with patches, or is it running vulnerable software? Application inventory. What applications are installed on the mobile device? Security policy. Does the device meet the security policy requirements for the organization (device authentication requirements, required permission controls and so on)? 17
19 Interpreting the Results (CONTINUED) Organizations need to clearly identify a policy for mobile device use that defines the expectations for the end user. For BYOD deployments, mobile device management systems are often a poor fit: The organization may not have the freedom to define policies and requirements for a device they do not own. Still, reporting information can be captured passively using commercial and open source tools (for example, gathering device version information from Microsoft Exchange server logs using iphlogparse). 7 These deployments may need to pursue an alternative mobile management strategy, either using containerized security tools that limit platform accessibility to enterprise data contained within a single app or remote access solutions that prohibit on-device data storage, such as Citrix. Policy to Guide Device Requirements and Use Organizations need to clearly identify a policy for mobile device use that defines the expectations for the end user. Just because the end user owns the device does not mean that he or she should expect to get (or that the organization should grant) unrestricted access to data within the organization. Organizations should apply caution when refusing end-user requests for data access from mobile devices. Without offering alternatives or properly secured access, organizations may find users taking matters into their own hands. The organizational policy should define the level of access from mobile devices and should take reasonable steps to enable end-user data access though safe and managed controls. In cases where container applications are deployed, inspection for jailbreaking or rooting the mobile device is imperative
20 Conclusion From the raw data to the individual comments in our survey, it s clear that BYOD triggers a fear and loathing response from IT professionals. It s also clear that organizations are committed to making personally owned devices a reality in the business world but with varying plans for exposing data to those devices. This is despite significant and growing concerns around the lack of sufficient security controls, the shortcomings of mobile device manageability and visibility, and the rapidly growing threat of malicious applications. From a defensive perspective, organizations are widely leveraging user education and training to protect data accessed by mobile devices, but the adoption of additional controls falls off quickly thereafter. Only a small percentage of organizations uses device fingerprinting, data classification, monitoring and encryption services to protect sensitive information resources on mobile devices. For application access, most organizations still rely on VPN for access control and data confidentiality/integrity protection. Simultaneously, the disclosure of security vulnerabilities against mobile devices is showing no signs of slowing, with numerous significant vulnerabilities regularly reported against ios and Android devices, the two most popularly adopted platforms according to the survey respondents. With the continued growth of malware and hostile applications on Android and ios, it is likely that we ll see continued growth in mobile device compromises as a regularly exploited attack vector. Fortunately, organizations have options available to them for enabling the mobile workforce through controlled data access by leveraging sophisticated data containerization solutions that provide an independent security layer on top of the platform operating system, as well as flexible data isolation mechanisms with virtual session application access and strong authentication controls. Through the use of these systems, along with application scrutiny and clear policy requirements for end users, organizations can grow their BYOD deployments while at the same time safely protecting and monitoring sensitive data access. 19
21 About the Author Joshua Wright is a senior technical analyst with Counter Hack, a company devoted to the development of information security challenges for education, evaluation and competition. Through his experiences as a penetration tester, Josh has worked with hundreds of organizations on attacking and defending mobile devices and wireless systems. As the technical lead of the innovative CyberCity, Josh also oversees and manages the development of critical training and educational missions for cyberwarriors in the U.S. military, government agencies and critical infrastructure providers. Sponsor SANS would like to thank this paper s sponsor: 20
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
SANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Five Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík
06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions:
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It
WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Mobile E-Commerce: Friend or Foe? A Cyber Security Study
Research February 2015 Mobile E-Commerce: Friend or Foe? A A J.Gold Associates Research Report Many consumers now interact with the Internet primarily through mobile devices, avoiding traditional PC devices
Simplifying the Challenges of Mobile Device Security
WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Bell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series
Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
BEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
