A framework for auditing mobile devices

Size: px
Start display at page:

Download "A framework for auditing mobile devices"

Transcription

1 A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International Baker Tilly Virchow Krause, LLP

2 Learning objectives Understand different approaches for managing mobile devices including centralized, decentralized, and BYOD management Identify the impacts of mobile devices at organization Critically analyze mobile device risks using a framework focused on people, devices, applications/websites, and data Define key mobile device controls to incorporate into audit work plans 2

3 Contents Define mobile & BYOD Impacts of mobile devices at organizations Risks and internal audit considerations Key mobile device management controls A framework for mobile device auditing Examples of environment Resources

4 Define mobile & BYOD Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International 2010 Baker Tilly Virchow Krause, LLP 4

5 Why do we care? Mobile is here, no going back to being tethered to a desk Mobile allows great productivity and flexibility to achieve organizational objectives Mobile employees are happier (so they say) Mobile can save money (maybe?)

6 Why is mobile the future? A Cisco study says in 2014 the average number of connected devices per knowledge worker will reach an average of 3.3 devices, up from 2.8 in 2012 Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes

7 What is a mobile device? NIST (SP ) characteristics: Small form factor Wireless network interface for internet access Local built-in (non-removable) data storage Operating system that is not a full-fledged desktop/laptop operating system Apps available through multiple methods Built-in features for synchronizing local data

8 What is a mobile device? NIST optional characteristics: Wireless personal area network interfaces (e.g., Bluetooth, near-field communications) Cellular network interfaces GPS Digital camera Microphone Support for removable media Support for using the device itself as removable storage

9 What is a mobile device? Any easily portable technology that allows for the storage and transmittal of your organization s data Examples: Phones Tablets Laptops External hard drives (e.g., USB thumb drives) Cameras (e.g., point and shoot) Logistics devices (e.g., GPS Tracking devices, RFID) ereaders Digital music players (e.g., ipods) Medical devices (e.g., pacemakers) Smartwatches and glasses

10 What is BYOD? Bring Your Own Device Supported by organization systems and applications that allow multiple type of devices to access those services Powered by the internet

11 BYOD pros & cons Pros: Reduced upfront costs Employee satisfaction Potentially greater functionality for users Cons: Unmanaged devices with your organization s data Mingling of personal and organizational data Managing legal requirements (e.g., ediscovery)

12 BYOD in the Enterprise A Holistic Approach, ISACA JOURNAL, Volume 1, 2013

13 Risks and internal audit considerations Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International 2010 Baker Tilly Virchow Krause, LLP 13

14 Major security concerns (NIST) Lack of physical security controls Use of untrusted mobile devices Use of untrusted networks Use of apps created by unknown parties Interaction with other systems Use of untrusted content Use of location services

15 What are the mobile device risks? NIST characteristics Small form factor Wireless network interface for internet access Local built-in (non-removable) data storage Operating system that is not a fullfledged desktop/laptop operating system Apps available through multiple methods Built-in features for synchronizing local data Illustrative risks Loss or theft of data Exposure to untrusted and unsecured networks Loss or theft of data Reduced technical controls Exposure to untrusted and malicious apps Interactions with other untrusted and unsecured systems

16 What are the mobile device risks? NIST characteristics Wireless personal area network interfaces (e.g., Bluetooth, near-field communications) Cellular network interfaces GPS Digital camera Microphone Support for removable media Support for using the device itself as removable storage Illustrative risks Exposure to untrusted and unsecured networks Exposure to untrusted and unsecured networks Exposure of private information Exposure of private information Exposure of private information Loss or theft of data Interactions with other untrusted and unsecured systems

17 IA considerations scoping Does your organization have a mobile device strategy, including: Alignment with organizational strategy/objectives Risk assessment(s) for mobility Definition of devices Policies governing the use of devices (with penalties) Security standards based on data

18 IA considerations scoping (cont.) Who owns these devices, organization or employee? Who is responsible for managing and securing the devices? Incident response procedures Antivirus / antimalware software Who is paying for devices and service plans? Does that change responsibilities? What are the legal and regulatory requirements for your organization and the jurisdictions you operate in?

19 Identifying owners and stakeholders Who is your client? Who are the stakeholders? General Counsel Chief Information Officer Chief Information Security Officer Chief Operations Officer Chief Compliance Officer Chief Privacy Officer Chief Risk Officer Other functions with a stake in privacy and security (e.g., human resources, sales)

20 Understanding the organization Mission and objectives Organization and responsibilities Customers Types of data Exchanges of data Interdepartmental Third parties Interstate or international Data collection, usage, retention, and disclosure Systems (e.g., websites, apps)

21 Assessing risk Leveraging management s risk assessments Consultation with legal counsel Regulatory risk Legal/contractual risk Industry self-regulatory initiatives Constituency relations and perceptions Public relations

22 Where s the GRC? Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International 2010 Baker Tilly Virchow Krause, LLP 22

23 Old model Protect everything in my office network with physical and logical controls over access Then we added laptops and pushed the network out of the office using VPNs That doesn t work any more with phones and tablets, especially when they are owned by the employee

24 Framework benefits Flexible audit all at once or in parts Adaptable scope it how you want it Inclusive make use of other standards/frameworks (e.g., COBIT, ISO 27002, NIST) ISACA s Bring Your Own Device (BYOD) Security Audit/Assurance Program

25 Mobile device framework Data Websites & Apps Devices People

26 Mobile device framework Data Websites & apps Devices People

27 Mobile device framework data Data (i.e., data generated, accessed, modified, transmitted, stored or used electronically by the organization) is essential to the organization's objectives and requires protection for a variety of reasons, including legal and regulatory requirements. Examples: Messages (e.g., s, text messages, instant messages) Voice Pictures Files (e.g., attachments) Hidden (e.g., GPS)

28 Building the framework data types DATA WEB & APPS DEVICES PEOPLE Data Data Data Data Data Baker Tilly Virchow Krause, LLP

29 Mobile device framework data Classification tiers Data owners/stewards Data inventory

30 Mobile device framework data audit considerations Determine the types of data that can be accessed or stored on mobile devices. Assess restrictions in place to safeguard data. Review the data classification security policy to ensure specificity to the various types of data, based on sensitivity. Use/create an inventory of data, identify the applications and websites where it can be accessed, and determine who will take ownership of the data moving forward.

31 Mobile device framework data audit considerations Determine if authentication and security requirements or restrictions are or should be established for each data type Determine if Legal Hold requirements are documented and align with data classification and then mobile device security

32 Building the framework data: classification DATA WEB & APPS DEVICES PEOPLE Data Confidential Data Restricted Data Data Internal Use Data Public Baker Tilly Virchow Krause, LLP

33 Data audit considerations from ISACA s work program Data Access Encryption and Data Protection

34 Mobile device framework websites & apps Websites and applications (i.e., tools used to process electronic data) require security controls, regardless of the device used for access, to protect the confidentiality, integrity, and availability of data.

35 Mobile device framework websites & apps examples Types Business Personal Websites/portals Cloud services App stores Custom built apps & sites Virtual desktop environments/remote desktop tools Outlook web access Business intranet Google services Salesforce.com Microsoft Office 365 Apple app store Google marketplace Amazon app store Custom corporate stores Business specific Citrix VMware Google Yahoo ESPN Gmail Flickr Facebook Apple app store Google marketplace Amazon app store Entertainment Hacking/malicious GoToMyPC VNC

36 Building the framework web & apps DATA WEB & APPS DEVICES PEOPLE Data Confidential App Data Restricted Web Data Data Data Internal Use Public App Web App Baker Tilly Virchow Krause, LLP

37 Mobile device framework web/apps audit considerations Determine the websites and applications that are used on mobile devices to access data, and determine whether they are approved. Assess how websites and applications are secured to protect data. Review all applications and websites accessible via mobile devices to ensure they comply with security policies (e.g., encryption requirements, storage restrictions, access permissions).

38 Building the framework web & apps DATA WEB & APPS DEVICES PEOPLE Data Data Data Data Data Confidential Restricted Internal Use Public App Web App Web App Baker Tilly Virchow Krause, LLP

39 Web/App audit considerations from ISACA s work program Malware Protection Secure Software Distribution

40 Mobile device framework devices Devices (i.e., hardware used to access websites and applications for data processing) require an increasing variety of security controls due to the increased mobility, choice, functionality, and replacement of these products.

41 Mobile device framework devices Managed vs. unmanaged Business vs. employee owned

42 Mobile device framework devices Encryption Data transfers (e.g., sending and syncing) Logical security (e.g., linkage to HR, passwords, access management) Physical security Network architecture (e.g., configuration, monitoring) Mobile device management (***more later)

43 Mobile device framework devices audit considerations Determine the types of mobiles devices that are used to access data, and whether each mobile device is supported. Assess how mobile devices are secured to protect data. Ensure that both organization managed and personally owned mobile devices that access confidential or high-risk data are secured with appropriate security controls.

44 Building the framework devices DATA WEB & APPS DEVICES PEOPLE Data App Phone Confidential Data Web Tablet Restricted Data App Laptop Internal Use Data Web Public Data App Baker Tilly Virchow Krause, LLP

45 Device audit considerations from ISACA s work program Device Access Restrictions Explicit Permission to Wipe Data Encryption and Data Protection Remote Access Network Access

46 Device audit considerations from ISACA s work program Mobile Device Management (MDM) is Deployed Central Management of BYOD Devices Monitoring of BYOD Usage Interfaces to Other Systems Remote Management

47 Mobile device framework people People (i.e., employees that process data via websites and applications through a variety of devices) require frequent communications and trainings on the risks, policies, practices, and tools for protecting the confidentiality, integrity, and availability of data.

48 Mobile device framework people Risk assessment Policies, procedures, standards Training and awareness programs with acknowledged roles and responsibilities Monitoring

49 Mobile device framework people audit considerations Determine if an overarching mobile device security policy exists. Assess existing policies and procedures that guide the procurement, use, support, and management of mobile devices. Determine who uses mobile devices to access data, and who supports and manages those mobile devices that access data.

50 Mobile device framework people audit considerations Advise departments on creating supplementary mobile device security practices as needed. Assess formalized training and awareness programs that inform mobile device users of the risks involved and their personal responsibilities when accessing information. Are employees OK with you wiping their device? What happens to personal data on the device?

51 Mobile device framework people audit considerations Labor laws (Exempt vs. Non-exempt, union) Employment contracts OSHA Tax laws (reimbursements for devices, services) Export control laws (travel) Record management laws Fair Credit Reporting Act Local jurisdiction laws (of employee s residence)

52 Mobile device framework people employee agreement Eligibility Applicable company policies Data storage and backup Data and device management Legal hold notice Hardware support (theft, loss, damage) Software support Travel and physical security

53 Mobile device framework people employee training Define BYOD/MDM for your organization Onboarding device process Roles/responsibilities Expense reimbursements/stipends Security policies Data ownership policies Practical app use with organization data Tech support From Techrepublic.com

54 Building the framework people DATA WEB & APPS DEVICES PEOPLE Data App Phone Policy Confidential Data Web Tablet Agreement Restricted Practices Data App Laptop Procedures Internal Use Data Web Practices Data Public App Risk Assessment Baker Tilly Virchow Krause, LLP

55 People audit considerations from ISACA s work program BYOD Initial Risk Assessment BYOD Ongoing Risk Assessment Employee BYOD Agreement Mobile Acceptable Use Policy (MAUP) Human Resources (HR) Support for BYOD Contractors Exemptions from BYOD policies

56 People audit considerations from ISACA s work program Legal Involvement in BYOD Policies and Procedures Legal Hold Help Desk Policy Approval Monitoring BYOD Execution Initial Training Security and Awareness Training

57 What is mobile device management? Process for managing mobile devices, including policies, procedures, training, and systems and Industry term for software tools used to centrally administer mobile devices, specifically for security purposes

58 Types of mobile device management processes (Gartner) Control-oriented Choice-oriented Innovation-oriented Hands-off

59 What do MDM tools do? (Gartner) Software management Network service management Hardware management Security management **Focus of these tools is phones and tablets; some support laptops, but other device types are not typically supported

60 MDM tools market (Gartner) MDM tools market estimated $784 million market About 128 or more firms in the market MDM tools projected to be $1.6-billion market by 2014 Market penetration estimated at less than 30 percent

61 MDM tools prices (Gartner) Three years ago = $60 to $150 per device Today = under $30 per device Traditional endpoint protection = $10 to $15 per seat

62 Mobile device management and the framework Cuts across all four parts of the framework Data some ability to restrict access Websites & apps blacklisting, whitelisting, deployment Devices implement system controls People use of MDM must align with policies (especially HR and legal areas)

63 Key features of MDM tools Centralize device management through policy and configuration management Control both corporate owned and personally owned devices SaaS and on-premises delivery models

64 Key features of MDM tools Still require thorough testing: Connectivity Protection Authentication Application functionality Logging Performance management

65 Two main flavors of MDM tools Messaging server based (e.g., Microsoft Exchange) Limited control enforcement Limited support for devices Third party provided (e.g., Airwatch, Mobileiron, Good) Additional costs and licenses required Another application to support and manage

66 When would you use MDM? BYOD Data encryption Multiple device operating systems Security breach impact Existing end point tools don t work for mobile devices

67 MDM audit considerations from ISACA s work program (9.1.2) A secure portal for BYOD users to enroll and provision their devices Centralized security policy enforcement Remotely lock and wipe data and installed apps Inventory devices, operating systems (OSs), patch levels, organization and third-party apps, and revision levels Distribution whitelists and blacklists

68 MDM audit considerations from ISACA s work program Permission-based access controls for access to the organization s networks and data Selective wipe and privacy policies for organization apps and data, i.e., sandboxing Distribution and management of digital certificates (to encrypt and digitally sign s and sensitive documents) Role-based access groups with fine-grained access control policies and enforcement Over-the-air (OTA) distribution of software (apps, patches, updates) and policy changes

69 MDM audit considerations from ISACA s work program Postpone automatic updates from Internet service providers (ISPs), e.g., in cases where an automatic OS update may cause critical apps to fail Secure logs and audit trails of all sensitive BYOD activities Capability to locate and map lost phones for recovery Backup and restore BYOD device data Remove or install profiles based on geographic location, to ensure compliance with relevant foreign legislation, e.g., data privacy and security

70 MDM audit considerations from ISACA s work program When BYOD devices attempt to connect to the organization s networks, the MDM system automatically checks: Patch levels for OSs and apps Required security software is active and current, i.e., antivirus, firewall, full-disk encryption, etc. Device is not jailbroken (Apple) or rooted (Android) Presence of unapproved devices (if any) Presence of blacklisted apps If any of the above login checks fail, the MDM can automatically update the device concerned (e.g., patch levels) or disallow access.

71 MDM audit considerations from ISACA s work program Don t forget to the secure the MDM system itself MDM Application Security

72 Building the framework complete DATA WEB & APPS DEVICES PEOPLE Data Confidential App Phone Policy Data Web Tablet Agreement Restricted Practices Data App Laptop Procedures Internal Use MDM Data Web Practices Data Public App Risk Assessment MDM Baker Tilly Virchow Krause, LLP

73 Major security concerns (NIST) mapped to framework area Security Concern Data Websites & Apps Device s People Physical security controls X X Untrusted mobile devices X X Untrusted networks X X Untrusted apps X X X Interaction with other systems X X X X Untrusted content X X X Location services X X X X

74 Examples of environments Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International 2010 Baker Tilly Virchow Krause, LLP 74

75 Example no BYOD DATA WEB & APPS DEVICES PEOPLE HR HR Phone Policy Confidential IF Financial Tablet Agreement Restricted Practices Customer CRM Laptop Procedures Internal Use MDM Other Web Training Public MDM - Process & Technology Risk Assessment Baker Tilly Virchow Krause, LLP

76 Example mixed devices, controls by type DATA WEB & APPS MDM - Tech DEVICES PEOPLE Customer Confidential CRM Confidential Phone Practices Policy Employee Restricted Custom Built Ops Restricted Internal Use Tablet MDM Agreement Trade Secrets Internal Use HR/FIN Public Laptop Procedures Marketing Public Web Internal Use Phone Practices Training Public Tablet Risk Assessment Baker Tilly Virchow Krause, LLP

77 Example owned & BYOD with controls DATA WEB & APPS MDM - Tech OWNED PEOPLE Customer Confidential HR Confidential Phone Practices Policy Restricted Employee Restricted FIN Public Tablet MDM Agreement Other Public Document Management MDM - Tech BYOD Procedures Confidential Phone Practices Training Restricted Public Tablet MDM Risk Assessment Baker Tilly Virchow Krause, LLP

78 Resources Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International 2010 Baker Tilly Virchow Krause, LLP 78

79 Resources BankInfoSecurity, BYOD: Get Ahead of the Risk, Intel CISO: Policy, Accountability Created Positive Results, January 2012 Digital Services Advisory Group and Federal Chief Information Officers Council, Bring Your Own Device, A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs, August 2012 Gartner, Magic Quadrant for Mobile Device Management, May 2012 Gartner, Gartner Says Consumerization Will Drive At Least Four Mobile Management Styles, November 2011

80 Resources National Institute of Standards and Technology, Special Publication Revision 1 (Draft), Guidelines for Managing and Securing Mobile Devices in the Enterprise, July 2012 National Institute of Standards and Technology, Special Publication , Guidelines on Security and Privacy in Public Cloud Computing, December 2011

81 Resources BYOD audit/assurance program Securing mobile devices using COBIT 5 for information security

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University

More information

How To Protect Your Organization From Liability From A Cell Phone (For Business)

How To Protect Your Organization From Liability From A Cell Phone (For Business) Bring Your Own Device: A Framework for Audit March 6, 2013 1 Webinar Moderator Phil Hurd ACUA President 2 Your Presenters Mike Cullen, Senior Manager CISA, CISSP, CIPP/US > Leads the firm s Technology

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360. MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Mobile Device Security and Audit

Mobile Device Security and Audit Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP [email protected] Session Objectives Define mobile devices

More information

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida 2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

Mobile Device Management

Mobile Device Management 1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

Conducting a Risk Assessment for Mobile Devices

Conducting a Risk Assessment for Mobile Devices Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique

More information

MDM and beyond: Rethinking mobile security in a BYOD world

MDM and beyond: Rethinking mobile security in a BYOD world MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Information Security @ Blue Valley Schools FEBRUARY 2015

Information Security @ Blue Valley Schools FEBRUARY 2015 Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?

www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready? www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready? Why is this important to you? Background Enterprise mobility through Bring-Your-Own-Device (BYOD) has been around for

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

1 Mobile Device Management

1 Mobile Device Management roduct Service Description 1 Mobile Device Management Mobile Device Management (MDM) is the process of monitoring, configuring, and securing mobile devices over-the-air (OTA). Hardware and software technologies

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: [email protected] Mobile Security Standard

More information

AirWatch for Android Devices

AirWatch for Android Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information