Presenting Network Security Solutions: Compliance Ready Mobile Device Management (MDM) Presenters: Your Name iboss Network Security Your Title
Background on iboss Network Security Over Nine Years of Engineering: The company was founded in 2004 and originally engineered as a Bi-Directional AES Encryption Solution (iphantom), which utilized cloud architecture to protect mobile users data from being compromised. In 2005, Web 2.0, fiber Internet, and mobile technology emerged, creating a demand for Web Security to address modern enterprises. Our teams spent three years in development and created over 32 million lines of proprietary code before releasing the iboss Secure Web Gateway (SWG) product line in 2008. Innovation and Dedication: Our proprietary engineering has included 34 patents pending related to mobile security, authentication, and SSL. We ve developed scalable, proprietary cloud architecture as the foundation for all products. We found a need for greater content awareness and engineered a high-performance Threat & Event console-reporting platform. The company has expanded its product base to include Web, behavioral data, IPS, and threat security solutions to integrate with the Threat & Event console.
A World Gone Mobile By 2015mobile app development projects will out number native PC projects by a ratio of 4:1. By 2015, 80% of people accessing the internet will do so from a mobile device.
Different Mobile Device Scenarios There are two common scenarios of mobile devices on a network, those owned by an organization and Bring Your Own Devices (BYOD) user owned devices Organization Owned Organization purchases and distributes devices Have more control over device to install security agents Typically requires an organizations compliance be extended to wherever that device is on or off-premise Potential security issues when off-premise BYOD Organization does not own the device. Users bring personal device Increase technology in the organization without increasing budgets Limited ability to install a security agent on these devices The need to extend compliance on a device that you have limited control of Can introduce threats to the network
BYOD Programs Growth of Mobile Devices in Classrooms Types of Devices Elementary Middle School High School Higher Education Access to Mobile Devices A cart with a class set of mobile devices is shared by multiple classrooms Some or all classrooms have a set of mobile devices students share Some classrooms have a full class set of mobile devices and some don t Classrooms have a 1:1 ratio of mobile devices to students
Common Concerns with Mobile Devices Filtering a mix of device platforms Making mobile devices directory aware for group based policy enforcement Extending the Acceptable Use Policy (AUP) & compliance when the device is off campus Protecting network bandwidth and network resources Centralized policy and reporting management across all devices Ideally gain more control of mobile devices to push Apps, wipe, and remotely update settings Managing BYOD mobile devices in which we have limited access to physical device BYOD Specific Issues: Consistent access to the internet Reporting & Compliance Exhausting network Resources Networks can quadruple overnight Introduction of new threats through unsecured devices
Why We Need Mobile Device Management (MDM) Mobile users will outpace desktop users by 2017 MDM simplifies managing devices and expands the technology into the classroom Mobile devices allow for more productivity and the potential to work while off campus The growth of mobile devices also creates a need to extend compliance to these devices on and off premise Core compliance concerns for mobile devices whether on or off premise: -CIPA- Technology protection measure to block obscene, child pornography, or harmful to minors -HIPAA- Prevent access to unauthorized sites, transmission of sensitive information, and downloading of files with malicious code
Traditional MDM & Its Limitations Traditional MDM manages what is on mobile device Example - Push APPs, set WIFI, opening and closing the APP store Traditional MDM does NOT provide is compliance to mobile devices To achieve CIPA, COPPA or HIPAA compliance, traditional MDM requires 3 rd party integration for: web filtering data loss protection document security bandwidth management email security Increases cost to provide compliance on mobile devices 3 rd party integration typically is done through proxy settings adding complexity and increases total cost of ownership MDM and 3 rd party integration not cohesive
Security Beyond MDM for ALL Devices
Maximize Your Investment All inclusive MDM & Web Security across all devices Includes web filtering, application firewall security, and threat/reporting solutions Scalable to grow as your network expands Remember, networks can quadruple overnight when BYOD Programs are initiated Future Proof Innovative and flexible to secure the next latest and greatest device your students will bring in
TM MobileEther by iboss Security Enterprise Mobility Management
Off-Premise and BYOD Unified Security Off-Premise Mobile Security Secure across HTTPS/SSL, Applications and Threats in the cloud while off-premise Extend industry compliance such as CIPA or HIPAA Unified Security Centralized policy management applies to on and off premise devices Secure devices in the cloud with or without on premise hardware BYOD Management Tools Secures against Botnet, Malware and Data Loss Protection (DLP) Secure across HTTPS/SSL and manage applications Consistent policies Users have the same web access on BYOD device or traditional PC Make BYOD Users Directory Aware even without an existing NAC Throttle/QoS Bandwidth management Ensures BYOD users do not interrupt mission critical traffic
Integration With Existing iboss Security Products iboss MobileEther integrates seamlessly with existing iboss SWG products in seconds at no cost (not required) One policy creation erase the need to create policies for on premise vs. mobile devices Report on premise network activity and mobile device activity through central console Consistent Internet access as users move from traditional PCs to BYOD or organization owned mobile devices
TM MobileEther Provides Forensic Reporting Identify Mobile Devices by User Name, Location, and Activity Packet Level Resource Tracking Bandwidth Heat Maps Live Threat Dashboards Dynamic Geomapping Activity Malware and Botnet Reporting and Mitigation Data Loss Prevention with Suspect Data Tracking Compliance Report Automation
Conclusion The right solution will save you time & resources Protects all devices wired/mobile Secures devices wherever they are on/off campus Creates a seamless experience for the end users
The iboss Secure Web Gateway is a cost-effective, turn-key solution that addresses the complexities of today s network security needs saving your district time, resources, and money. Contact me for a personalized webinar or evaluation. Learn more at iboss University Follow us on our blog, LinkedIn & Twitter Your Name Your.name@iboss.com 877-742-6832 x your extension www.iboss.com