Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Similar documents
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing Complete BYOD Security with MDM and NAC

Security Considerations for Enterprise Mobility / BYOD

ForeScout MDM Enterprise

The ForeScout Difference

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Addressing BYOD Challenges with ForeScout and Motorola Solutions

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

MDM Mobile Device Management

How To Improve Your Network Security

Chris Boykin VP of Professional Services

Securing Healthcare Data on Mobile Devices

ForeScout CounterACT. Continuous Monitoring and Mitigation

Mobile Device Management for CFAES

I D C V E N D O R S P O T L I G H T. Ar c h i t e c t i n g a Flexible Strategy f o r S e c u r i n g

How To Write A Mobile Device Policy

Technical Note. ForeScout MDM Data Security

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Cisco Mobile Collaboration Management Service

Guideline on Safe BYOD Management

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Securing BYOD With Network Access Control, a Case Study

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Kaspersky Security for Mobile

ControlFabric Interop Demo Guide

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer

ClearPass Policy Manager

BYOD: End-to-End Security

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Whitepaper. Securing Visitor Access through Network Access Control Technology

Advanced Configuration Steps

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune

Mobile device Management mit NAC

GlobalProtect Overview

Symantec Mobile Management Suite

ForeScout Technology Mobile Security Software

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014

BYOD Policy Implementation Guide. February 2016 March 2016

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Managing Mobility in the BYOD Era:

IBM Endpoint Manager for Mobile Devices

Smart Givaudan. From BYOD experience to new mobile opportunities

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

The User is Evolving. July 12, 2011

Mobile Security Solution BYOD

Bell Mobile Device Management (MDM)

4 Steps to Effective Mobile Application Security

IT Resource Management & Mobile Data Protection vs. User Empowerment

BYOD Policy & Management Part I

The BYOD Wave: Policy, Security, and Wireless Infrastructure

What We Do: Simplify Enterprise Mobility

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager

BYOD Management : Geo-fence

Peace of mind across all your mobile devices

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Microsoft Enterprise Mobility Suite

How To Make Your Computer System More Secure And Secure

Network Access Control in Virtual Environments. Technical Note

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

The Holistic Guide to BYOD in Your Business Jazib Frahim

Total Enterprise Mobility

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Workplace-as-a-Service BYOD Management

2/23/2013 BY VORAPOJ LOOKMAIPUN CISA, CISM, CRISC, CISSP Agenda. Security Cases What is BYOD Best Practice Case Study

BYOD Enabling Technologies

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Hands on, field experiences with BYOD. BYOD Seminar

Mobility Challenges & Trends The Financial Services Point Of View

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

M a as3 6 0 fo r M o bile D evice s

Mobility Impact on the Enterprise

Technical Note. CounterACT: 802.1X and Network Access Control

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

[BRING YOUR OWN DEVICE POLICY]

Addressing NIST and DOD Requirements for Mobile Device Management

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Tuesday, June 5, 12. Mobile Device Usage

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Mobile and BYOD Strategy

Mobile device and application management. Speaker Name Date

Codeproof Mobile Security & SaaS MDM Platform

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

6 Things To Think About Before Implementing BYOD

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Access Tropical Cloud Desktop from Any Device

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Bring Your Own Device Mobile Security

Secure Mobile Solutions

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

Technical Note. ForeScout CounterACT Rogue Device Detection

Systems Manager Cloud Based Mobile Device Management

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

Transcription:

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Sco$ Gordon CISSP- ISSMP Vice President, ForeScout June 14, 2012 2012 ForeScout, Page 1

Bring Your Own Device BYOD Many things to many people BYOD: the level at which an IT organization prohibits, tolerates, supports or embraces personal mobile device use in their company and the non-technical and technical controls used to enforce the policy Question: is it about the user, device, network, connections, applications, privacy or data? Answer: All the above it s all interrelated Policy needs to consider all the above 2012 ForeScout, Page 2

Policy Development Define use cases first, tools later Define and document mobility use cases Involve relevant stakeholders more efficient and better assures acceptance Business drivers User types Device and application use Use of an access to network resources Devices supported Data protection requirements Risks and legalities Control mechanisms Costs 2012 ForeScout, Page 3

Various Technical Controls Most companies will use a variety of mechanisms Block all of the BYOD devices WAP Wireless Access Point NAC Network Access Control MDM - Mobile Device Management MAW - Mobile Application Wrapper MEAM Mobile Enterprise Application Management Cloud / Virtual Data Store Cloud / Portals VDI - Virtual Desktop Infrastructure 2012 ForeScout, Page 4

NAC in AcOon Who and what is on your network? Assess access credentials and LIMIT FIX endpoint security posture Allow, limit or block network access based on policy Remediate violations, fix endpoint Web Email CRM compliance gaps and stop threats Sales Employee Guest 2012 ForeScout, Page 5

Mobile Device Management Basic Controls Device enrollment OTA configuration Security policy management Remote lock, wipe, selective wipe App portal Advanced Controls Email access controls Application management Document management Certificate management Profile lock-down PII Protection 2012 ForeScout, Page 6 Corp App Storefront Device Enrollment, Acceptable Use MDM Actions Event-based Security & Compliance

NAC+MDM Synergy for Mobile Security Visibility, compliance and access control NAC focus is on the network MDM focus is on the mobile device Mobile Security NAC Alone MDM Alone NAC+MDM Visibility Basic info on all mobile devices Full info on only managed devices Complete Access Control Partial (limited endpoint info.) For managed and email only Complete Compliance Limited Managed only Complete Network control Strong None Complete Deploy Agent Network based Pre-registration Both 2012 ForeScout, Page 7

Example: Automated RegistraOon Device connects to the network a. Classify its type: Mobile device and its type (Android, iphone ios, Blackberry OS) or PC (Windows, Mac, Linux) b. Check if it has the mobile agent? ForeScout If the agent is missing a. Quarantine the mobile device b. Register and install relevant MaaS360 agent on the mobile device (via HTTP Redirection) Once installed with an agent a. Allow access based on policy b. Continue monitoring the agent s operation ) ) ) ) ) ) ) 2012 ForeScout, Page 8

Example: Real- Ome Compliance TesOng Device connects to the network Has a mobile agent but is jail broken Force a compliance test a. CounterACT informs MaaS360 to assess configuration attributes b. If in violation, inform ForeScout CounterACT c. CounterACT quarantines the mobile device and sends informative message? ForeScout Enable a compliance recheck a. CounterACT informs MaaS360 to test b. Upon re-assessment, allows onto network if violation no longer exists c. Continue monitoring the agent s operation ) ) ) ) ) ) ) 2012 ForeScout, Page 9

Thank you. ForeScout Technologies - Automated Security Control Enable Access Agility without Compromising Security www.forescout.com 2012 ForeScout, Page 10