Comparative analysis of enterprise mobility management systems in BYOD environment
|
|
|
- Sharyl Jones
- 10 years ago
- Views:
Transcription
1 Comparative analysis of enterprise mobility management systems in BYOD environment Dragan Peraković University of Zagreb Faculty of Transport and Traffic Sciences Zagreb, Croatia Abstract Mobile terminal devices in a BYOD model are representing the vulnerability for organization s information infrastructure. Storage and processing of business data within the device, which is not under the control of the organization, can have negative consequences for its sensitive information, and control of such devices can compromise users' privacy. Therefore, the separation of business and personal data within the device is of great importance to organization s information security, but also for protection of users privacy. This paper analyzes the enterprise mobility management systems with the aim of determining the most used approach to separate data and other security mechanisms used to protect sensitive information. Keywords- BYOD; data containerization; enterprise mobility management system; data separation I. INTRODUCTION The application of information and communication technologies has resulted in a revolution of the way business is conducted. Further advancement of technology and the rapid development of smart mobile devices provided to employees greater mobility and flexibility, and thus greater efficiency in performing everyday tasks. The rapid development of mobile devices has led to the emergence of BYOD model that has enabled the employees an opportunity of using private mobile devices for business purposes. Although the BYOD as a model is more supported in organizations due to the mutual benefit for the organization and its employees, there is the problem of the sensitive information security. Through the device, which is not owned by the organization, are stored, processed and transmitted sensitive information and unauthorized access to this information could potentially have major negative consequences for the organization itself. It is logical that in such a scenario, the organization wants and needs to have some control over devices in order to reduce the risk of unauthorized access or manipulation of information. On the other hand, through control mechanisms, the organization may compromise privacy of the device owner, which is the legal and regulatory protected. The resulting problem can be solved by separating private and business data in the device and thus reduce the risk of compromising user privacy and unauthorized access to sensitive information of the organization. Such solutions are often implemented within a comprehensive enterprise mobility management system (EMM). Siniša Husnjak, Ivan Cvitić University of Zagreb Faculty of Transport and Traffic Sciences Zagreb, Croatia [email protected], [email protected] This paper explores the existing approaches used in the development of data separation solutions. In the paper is also carried out comparative analysis of solutions that are developed by several manufacturers in order to determine the current state of the EMM market. The ultimate goal of the analysis is to determine the most popular approach to the separation of private and business data. II. PROBLEM DEFINITION Smart mobile terminal devices, with help of the rapid development and decline in market prices have become affordable to a large number of users. Characteristics of such devices almost can be measured with a conventional computers, personal and laptop. They differ from conventional mobile devices in many advanced functionalities, such as [1]: The ability for small distance connections (WLAN, Bluetooth, NFC, WiMAX, etc.), Constant Internet connectivity through a packet based technologies (GPRS, EDGE, UMTS, HSUPA, LTE, etc.), The ability to determine the location (GPS), The possibility of extending the basic functionality of the mobile operating system by installing additional third-party applications, Large memory capacity of data storage media. Smart mobile terminal devices, therefore, are rapidly becoming widely used among users and not only for private but for business purpose also. A large number of organizations allow the use of private devices, of its employees and associates, for a business purposes, such as to conduct business calls, send and receive business and perform other business activities. Applied model is also called Bring Your Own Device (BYOD) [2]. Introducing BYOD model into organizational structure led to a redefinition of the way in which users perform their daily tasks, but also gave a clear insight into the way the organization manages its computer network, a mobile terminal devices, as well as human resources [2]. Application of BYOD model provides concrete benefits for employees, but also for the organization, such as increased employee satisfaction, increased productivity and financial savings [3]. However, due to the high mobility, small size and
2 connectivity options through several available technologies, mobile terminal devices are more vulnerable to security threats, listed below, then other client terminal devices (such as PCs and laptops), [4] [5]: Theft or loss of a mobile terminal device, Attacks on devices intended for recycling, Attacks through malicious content (viruses, worms, spyware, adware and Trojan horses) Monitoring data implemented sensors attacks (GPS, accelerometer, microphone, camera) Phishing attacks, Exploiting vulnerabilities in web browsers, Automatic downloads of applications, The attacks through spoofed network information, Exploitation of network oversights, Social engineering. The impact of these threats can be reflected as a negative consequence on the asset covered by threats [4]: Private data, Organization s intellectual property, Financial assets, The availability and functionality of devices and services, Personal and political reputation. As each segment of information and communication structures, mobile terminal devices also must support the three main objectives of security, confidentiality, availability and integrity. These goals can be achieved by combined application of security mechanisms, embedded within mobile devices as well as implementation of the additional security controls at different levels of information and communication structures [5]. The number of total malicious content variations for the Figure 1. A) DECREASE OF TOTAL NUMBER OF MALICIOUS CONTENT FOR ANDROID OS; B) DECREASE OF THE NUMBER OF MOBILE DEVICE VULNERABILITIES [6] Android operating system (OS) in year 2013 was decreased by 14% compared to the year 2012, as shown in figure 1 a) [6]. Also, as shown in figure 1 b), the number of vulnerabilities for mobile devices was decreased by 69% [6]. Despite the trends of decline, the number of vulnerabilities and threats is still extremely high and must not be ignored. Within a BYOD environment private and business data is stored and processed within the same device, which is owned by the user, and these devices often have access to the network and sensitive data of the organization [7]. Such a merging of private and business purpose of the device increases the likelihood of malicious activity and compromised sensitive information of the organization. It is therefore of great interest to the organization, which supports BYOD model, that with the application of safeguards reduce the security risk to a lower level, as far as possible. At the same time, the organization should not affect or have the insight and control over personal data and applications on user devices in order to avoid invasion of privacy or breach of law and regulatory provisions. III. METHODS USED IN DEVELOPING SOLUTIONS FOR DATA SEPARATION As previously mentioned in chapter 2 of this paper, the problem for the organization, but also for users in the BYOD model represents the processing, use and storage of private and business data within the same device without any security restrictions among them. This means that unauthorized access to the user device also means access to all of the data that the user owns on the device, residential and business. The problem for users is, for an example, management and device configuration by the organization where the organization can have an insight to, not only business but also in the private information of employees or the owner of the device. Therefore, a good data separation strategy is crucial for the security of the data, but also to preserve the privacy of users within BYOD environment. For the purpose of private and business data separation within the device certain methods were developed. Those methods are covered by a single term, mobile content management system (MCM). Mobile content management system is almost always part of a larger, organization s mobility management system (EMM). This system, along with MCM, combines several methods that cover aspects of the management and security of organizations mobile devices, data and applications, such as [8]: Mobile Management (MEM), Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM). Although all the methods of separation of private and business data have the same goal, protecting organization s applications and data, approaches to defined problem vary considerably. There are several approaches for the development of data separation methods [9]:
3 Virtualization - Mobile virtual desktop infrastructure (mobile VDI), - Mobile operating system virtualization (mobile OS virtualization). Containerization - Application-specific containers, - Application neutral containers, - Integrated containers. A. Virtualization Virtualization is a method of software and / or hardware environment emulation which runs on top of other software. This simulated environment is called a virtual machine [10]. The virtual machine is logically equivalent to a physical machine, and the reason for the wide application of virtualization is the ability to run multiple virtual machines on a single physical. Figure 2 shows the generalized view of virtual machine work principles. Virtualization layer allows simultaneous execution of multiple instances of operating systems on one computer dynamically sharing available hardware resources (CPU, RAM, HDD, I / O devices) [11]. 1) Mobile access to virtual desktop Mobile VDI refers to the infrastructure that provides access to a virtual desktop through a variety of mobile devices. Generally, it supports two basic client architectures [12]: Client-based mobile VDI - mobile VDI client application is installed on the mobile terminal device and it is used to create a session between the device and the computer infrastructure within the organization. Created session allows the mobile terminal device access to organization s applications FIGURE 2. GENERALIZED VIEW OF VIRTUAL MACHINE WORK PRINCIPLES Figure 2. GENERALIZED VIEW OF VIRTUAL MACHINE WORK PRINCIPLES Figure 1. Comparison of virtualization architecture: a) Hypervisor type 1; b) Hypervisor type 2 and data through virtualized interfaces. Mobile VDI based on web browser - this, alternative, architecture uses a web browser with support for HTML 5, to access the web-based mobile VDI client. Using this architecture eliminates the need for installation of client applications on the device. Regardless of the architecture, mobile VDI provides the user with only a snapshot of the desktop, which means that all data and applications are retained within the organization s infrastructure, [12] [13]. The disadvantage of the described approach lies in the fact that today mobile terminal device does not have the physical input units (mouse and keyboard), but rely on the application of virtual alternatives. Without classical input units it is difficult and sometimes impossible to use certain applications through solutions based on mobile VDI access. Also, due to the small dimensions of the device, users cannot always see the entire virtual desktop; for example, drop down menus of certain applications will not be visible. Therefore, it is necessary to test applications before they become available to users [12]. 2) Mobile operating system virtualization Due to the limited hardware capabilities of mobile terminal devices, implementation of mobile operating system virtualization solutions is the hardest viable method of separating private and business data. There have developed two types of virtualization hypervisor [14]. Type 1 hypervisor is hardware based and implemented into device that creates a new instance of an existing operating system. Both instances of the operating system are running on two separate processor regions [14]. Type 2 hypervisor is located on top of the operating system for which it is not have to be implemented during the manufacturing process, but it can be installed later. He is considered less secure then the hypervisor type 1 because of the possibility of compromising the operating system and the creating a path to achieve the attack on the virtual machine [15]. The difference between the above mentioned hypervisors architecture is shown in figure 3. Virtualization allows the creation of business unit instances of the OS in a virtual environment and its management without affecting the private user OS instance. As a user s business OS always located on a virtual machine the data transmission is disabled as well as communications of applications between the private and business instance of the OS. Usability problems may be related to the performance of the two instances of an operating system executing concurrently on a single device. Also, this method requires switching from private to business mode which can be impractical for the user [16]. B. Containerization Containerization provides administrators the ability to create secure containers on the device within which are all organization s applications and data. While applying this method, data can be shared exclusively between applications
4 that are within the safe container. This method allows the implementation of the organization's security policy over predetermined safe containers without affecting the functionality and data of the private portion of the device, [17] [18]. Containerization allows the implementation of various security mechanisms, such as [19]: Pushing content updates directly to secure container, Access restriction based on the time and location of the mobile device, Encryption of contents stored in secure container using the 256-bit SSL encryption, Removing the stored contents immediately after leaving the application. 1) Application specific containers Application specific containers require special application development because of the need to adapt the application programming interface (API) to protect data. They are also known as bolt-on Software Development Kit (SDK) containers. Because of the need to adapt the source code applications, this kind of standardized containers causes changes in the appearance of the user interface, which often leads to customer dissatisfaction [9]. 2) Application neutral containers Application neutral containers used a process called application wrapping for providing security mechanisms that are not part of the source code of the application. It is possible to impact on them remotely, through management applications. Applications wrapping can be implemented in a very short period of time because the application neutral containers do not require changes to the original application code. This data separation approach, in terms of usability, provides users with original application layout and consistency in ways of using private and business space [9]. 3) Integrated containers Due to the deep integration into the operating system, an approach based on an integrated container provides a high level of safety, significantly reducing the vulnerabilities associated with the performances of safe containers that are not integrated into the operating system. A holistic approach when designing integrated container allows optimization of security and business productivity by taking advantage of opportunities grouping of tools and applications designed for this purpose [9]. IV. COMPARATIVE ANALYSIS OD DEVELOPED SOLUTIONS A comparative analysis was performed in order to define the most effective approach in developing solutions for private and business data separation with the aim of providing a clear insight into the future direction of development. The analysis covered solutions of manufacturers that are located in different market positions (leaders, challengers, visionaries and niche players) [20]: IBM MaaS360 SAP Mobile Secure BlackBerry Enterprise Service 10 Symantec Mobile Management Suite All of listed manufacturers have developed EMM solutions and with the analysis will be compared only those functionalities that affects the separation of private and business data and applications, such as: Operating systems support, Mobile device management functionalities, Mobile applications and content management functionalities, Additional security mechanisms. A. Operating system support The purpose of introducing BYOD model, in addition to the advantages brought to the organization is enabling users to use private devices to increase their satisfaction and productivity in the workplace. As users often use different devices that run different operating systems, support for multiple operating systems is extremely important. B. Mobile device management functionalities Mobile device management functionalities play an important role in protecting organization's data. Some of the most important in terms of safety are: Selective, remote data wipe from the device - where it is possible to delete only the organization data without affecting the user data, Password protection of device, Ability to remotely lock the device, Multiuser support on a single device - automatic configuration of devices based on the currently logged user. C. Mobile application and content management functionalities In an organizational environment, applications are the key for delivery of content to users. Because of that, mobile applications and content management functionalities are very important segment of each EMM solutions. A quality approach to applications management is of great importance for the isolation of the business from private environment, which includes the separation of private and business data generated by the application itself or exchanged between. The most important functionalities of mobile applications and content management are the following: Possibility of applications containerization, Support for application-specific containers,
5 Disabling copying files between applications, Support for the application neutral containers, Mobile access to the desktop (mobile VDI), Disabling copying the contents of , Secure access to . D. Additional security mechanisms Additional security mechanisms are also in function of organization s applications and data protection during storage, processing or transmission and at the same time ensuring the privacy of user data. Some of the most important are, for example: Detection of malicious content, Secure data storage containers, Firewall functions. V. RESULTS OF COMPARATIVE ANALYSIS Results of comparative analysis of EMM solutions, in which emphasis is placed on essential functionalities used in private and business data separation, are shown in table 1. Based on the analysis results, it is concluded that all manufacturers of the developed solutions (regardless of their position on the market) are oriented toward neutral application containerization approach for the separation of private and organization data. The only manufacturer providing virtualized access (mobile VDI) is Symantec. However, this functionality is available exclusively through integration of third-party solutions within the existing system. In addition to the application neutral containers IBM and Blackberry support application specific containers. This approach is not used often because of the cost of application development and complexity of such implementation and impact to the original layout of the user interface. From the results it is evident that all developed solutions support the most common mobile operating systems, in addition to the BlackBerry Enterprise Service 10, which does not offer support for mobile operating systems based on Windows platform. Unlike IBM and SAP solutions, Blackberry and Symantec have multi-user support, which has greater importance for smart mobile devices, which are owned by the organization and used by multiple users (e.g. tablet devices). From additional security mechanisms aspect, IBM does not provide firewall functionality and BlackBerry does not provide firewall and possibility of malicious content detection. TABLE I. COMPARATIVE ANALYSIS OF EMM SOLUTIONS
6 VI. CONCLUSION Smart mobile terminal devices, with the rapid advancement of technology, are becoming an integral part of every organization. With the advent of BYOD model and its integration into the organizational structure there are seem to appear multiple problems while trying to protect such devices. The main goal of any organization is to protect business data and private information infrastructure, but at the same time they are legal and regulatory obliged to respect the privacy of the owner of the device, that is employees. In order to adequately and in a safe way separate private and business data on the user device, it is not enough to develop a solution that will be based solely on one approach to the data separation. With solutions for data separation is necessary, in parallel, to apply a range of additional functionality and security mechanisms. As a result of the aforementioned market demand, many manufacturers have developed solutions through which it is possible to manage the organization s mobile environment. Such solutions are grouping different functionalities which are applicable for the management and protection of devices that are associated with the organization. In order to determine the most appropriate approach for the separation of private and business data a comparative analysis of EMM solutions, from different manufacturers that are at different positions in the market, was conducted. The functionalities that affect the separation of private and business data in the BYOD model were analyzed. Based on the results of the comparative analysis it is possible to conclude that the most appropriate approach for separation of data is through the application of neutral container. The reason is uncomplicated process of application containerization that requires no modification of source code and does not change the appearance of the applications user interface. The results of comparative analysis may serve as the basis for selection of optimal EMM solutions by organizations depending on their needs for managing BYOD environment. REFERENCES [1] ISACA: Securing mobile devices using COBIT 5 for information security, ISACA, Rolling Meadows, USA, 2012 [2] Bradley, J., Loucks, J., James, M.: Horizons BYOD : A global perspective harnessing employee-led innovation, Cisco Systems Inc., San Jose, USA, 2012, pp [3] Slottow, T.: Action learning project : Bring your own device (BYOD), Business Finance Leadership Academy, 2012 [4] Peraković, D., Husnjak, S., Remenar, V.: Research of security threats in the use of modern terminal devices, 23td International DAAAM Symposium, vol. 23, 2012, pp [5] Murugiah, S., Scarfone, K.: Guidelines for managing and securing mobile devices in the enterprise (Draft), NIST, National Institute of Standards and Technology, USA, 2013 [6] Symantec Corporation: Internet security threat report 2014, vol. 19, Symantec Corporation, 2014 [7] Weldon, K.: How to protect business information and empower your employees at the same time, vol. 33, Current Analysis Inc., 2012, pp [8] TechTarget: Enterprise mobility management : choosing the right approach and considering costs, Techtarget, USA, 2014 [9] BlackBerry: Finding the right mobile device containerization solution, BlackBerry, 2014 [10] Scarfone, K., Souppaya, Hoffman, P.: Guide to security for full virtualization technologies, NIST, National Institute of Standards and Technology, USA, 2011 [11] VMware Inc.: Understandingf full virtualization, paravirtualization, and hardware assist contents, VMware Inc., 2007 [12] CDW Government LLC: Virtual desktop infrastructure goes mobile (White paper), CDW Government LLC, 2013 [13] Cisco Systems Inc.: Cisco enterprise mobility solution: device freedom without compromising the it network, Cisco Systems Inc., San Jose, USA, 2014 [14] Dual-identity smartphones could bridge BYOD private, corporate divide - Computerworld, (2014, Jun 20) Online document, Available: hones_could_bridge_byod_private_corporate_divide?taxonomyid=22 7&pageNumber=4. [15] Barr, K., Deasy, S., Newell, C.: The VMware Mobile Virtualization Platform : is that a hypervisor in your pocket?, ACM SIGOPS Operating Systems Review, vol. 44, no. 4, ACM New York, USA, 2010, pp [16] Mobile virtualization: Hypervisors go small. (2014. Jun 23) Online Document. Available: [17] Kaspersky Lab: Security technologies for mobile and BYOD, Kaspersky Lab, 2013 [18] Prabhu, N., Rendell, J.: Smart containerization TM, CA Technologies, 2014 [19] Mobile device management technologies. (2014, Jun 23) Online Document. Available: [20] Terrence, C., Smith, R., Silva, C., Taylor, B., Girard, J., Basso, M.: Magic quadrant for enterprise mobility management suites market definition / description, 2014, pp
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Samsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Virtual Desktop.. Infrastructure Goes Mobile..
White paper Virtual Desktop.. Infrastructure Goes Mobile.. VDI gives agencies a reliable option for addressing BYOD challenges. Executive Summary The ubiquity of mobile devices is no longer surprising.
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
CHECK POINT THE MYTHS OF MOBILE SECURITY
CHECK POINT THE MYTHS OF MOBILE SECURITY Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization s road warriors, but also create freedoms for all employees
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Control Issues and Mobile Devices
Control Issues and Mobile Devices ACC 626 Term Paper Ramandip Kaur June 27, 2014 Page Table of Contents Executive Summary...ii 1.0 Introduction... 1 2.0 Current Trends... 1 2.1 Employee Owned Devices and
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
Jits Langedijk Sr. Consultant [email protected]
1 Jits Langedijk Sr. Consultant [email protected] Tomorrow s Workspace Work is not a place, it s something you DO! Tomorrow s Workspace Application and Desktop Delivery Enterprise Mobility Management
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract
white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract This paper highlights what is the need of Enterprise Mobility Management
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Simplifying the Challenges of Mobile Device Security
WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean
Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
Mobile Application Testing
Mobile Application Testing Whitepaper Author: Scott Aziz Date: June 1, 2012 This whitepaper outlines the critical areas of testing needed to certify mobile enterprise applications Best practices from UST
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Mobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
Addressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Mobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
