MDM, COPE, BYOD, MAM, MIM, PIM???



Similar documents
MDM User Guide June 2012

How To Protect Your Mobile Device From Attack

Weak Spots in Enterprise Mobility Management Dennis Schröder

How To Manage A Mobile Device Management (Mdm) Solution

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

AirWatch Solution Overview

Security for mobile apps

Hands on, field experiences with BYOD. BYOD Seminar

Feature List for Kaspersky Security for Mobile

Codeproof Mobile Security & SaaS MDM Platform

Choosing an MDM Platform

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Tom Schauer TrustCC cell

ADDING STRONGER AUTHENTICATION for VPN Access Control

IT Resource Management vs. User Empowerment

Mobile Application Ecosystem

CHOOSING AN MDM PLATFORM

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

BYOD: End-to-End Security

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Good for Enterprise Good Dynamics

Mobile App Containers: Product Or Feature?

Smart Givaudan. From BYOD experience to new mobile opportunities

Mobile Device Security Is there an app for that?

SysAid MDM User Guide for ios

MDM Mobile Device Management

Mobility Challenges & Trends The Financial Services Point Of View

STRONGER AUTHENTICATION for CA SiteMinder

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price

BYOD Guidance: BlackBerry Secure Work Space

GCM for Android Setup Guide

User Manual for Version Mobile Device Management (MDM) User Manual

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

If you can't beat them - secure them

Mobile Device Management and Security Glossary

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Healthcare Buyers Guide: Mobile Device Management

Ben Hall Technical Pre-Sales Manager

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

The ForeScout Difference

What We Do: Simplify Enterprise Mobility

Secure Mobile Solutions

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Sophos Mobile Control Administrator guide. Product version: 3.6

IT Self Service and BYOD Markku A Suistola

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

PULSE SECURE FOR GOOGLE ANDROID

ipad in Business Mobile Device Management

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Sophos Mobile Control Administrator guide. Product version: 3

IT Resource Management & Mobile Data Protection vs. User Empowerment

Total Enterprise Mobility

iphone in Business Mobile Device Management

How To Protect Your Mobile Devices From Security Threats

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

HDAA BYOD Workshops May 2013

Workplace-as-a-Service BYOD Management

Ensuring the security of your mobile business intelligence

How To Secure Your Mobile Device

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Secure, Centralized, Simple

End User Devices Security Guidance: Apple ios 8

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ForeScout MDM Enterprise

When enterprise mobility strategies are discussed, security is usually one of the first topics

Guideline on Safe BYOD Management

Security and Compliance challenges in Mobile environment

Technical Whitepaper. Secure Docs

Cisco Mobile Collaboration Management Service

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ios Encryption Systems Deploying ios Devices in Security-Critical Environments

Enterprise Mobility Management

Guidance End User Devices Security Guidance: Apple ios 7

5 Secrets to a Successful Mobile Application Testing Strategy

Managing and Securing the Mobile Device Invasion IBM Corporation

Systems Manager Cloud Based Mobile Device Management

Enterprise Mobility Management for Financial Sector

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

Chris Boykin VP of Professional Services

Mobile Security & BYOD Policy

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Transcription:

MDM, COPE, BYOD, MAM, MIM, PIM??? Peter Teufl peter.teufl@iaik.tugraz.at

Overview Deployment scenarios Managed COPE BYOD Consumer Platform security lication security Best Practice

Managed Managed Handing out devices to employees devices/platform selected by company Ensuring that the devices comply with the security policy Locking down devices via Mobile Device Management (MDM), Mobile lication Management (MAM) etc. Enforcing password rules, remote wiping, forbidding installation sources Tracking High security can be achieved (depending on platforms etc.)

COPE Corporately-Owned, Personally-Enabled (COPE) similar to managed, however, more private use cases for the employee still closely related to the managed scenario for not highly secure deployment scenarios security/legal issues

BYOD Bring Your Own Device (BYOD) Light years away from managed/cope No influence on platform security (no MDM due to legal issues) lication security becomes much more important (own encryption etc.) Current solutions

BYOD Smartphone Smartphone MDM Config Config MAM Container Management Contai ner MDM Container Smartphone Business Area Smartphone Config Config MDM lication Wrapper Management MAM Private Area Wrappers Blackberry Config Balance

Consumer lications critical consumer applications (e.g. banking) Similar scenario as BYOD, although even less influence lication security and knowledge about platform security/features Detailed knowledge for security critical applications

Platform security features User/developer influence (BYOD ) lication security Secure implementations? Platform-specific functions

Platform Platform security Basic security: ALSR, DEP etc. Access protection (locks, encryption) Mobile Device Management lications: sources, APIs, market Cloud: Push notifications, storage etc. Backups: local, cloud, encrypted vs. unencrypted

Basic Updates? Fragmentation: Versions, Functionality? Operating System? Architecture? Malware Protection (buffer overflows, sandboxes)

Encryption/Access Protection! file-system? files? credentials? Influence of the developer? Always active? User interaction? Hardware chip in use? Encryption depends on PIN/passcode? Key derivation? Remote Wipe?

Mobile Device Management Which policies? Removing policies? lications, markets? Fragmentation? MDM - agent? OS or app based?

lications lication sources? APIs for applications? Access to SMS multi-tasking Permissions (Usability?) Developer influence on security related functions (encryption, backup)?

Secure lication Development Detailed knowledge about platform security and platform features Detailed knowledge for implementing own security functions Encryption Key Derivation Secure Communication External Commands: SMS etc. Root-Checks Inter-process communication

Example Container applications Key Derivation (Password to key ) key security function on encryption systems Passcode Salt Key Derivation Salt Long derivation times (e.g., 80ms per passcode) Know-How to get it right Mistakes: easy brute-force gentle-force attacks Key derivation Derived key Data encryption key

Example Lock-Screen Type Length Chars Number of passcodes Brute-Force Days Cost $ GPU Numerical 4 10 10000 0.0 0.0 0.0 6 10 1000000 0.0 0.0 0.0 8 10 100000000 0.0 0.0 0.0 10 10 10000000000 0.2 0.0 0.0 Alphanum 4 36 1679616 0.0 0.0 0.0 10/26 letters 6 36 2176782336 0.0 0.0 0.0 7 36 78364164096 1.3 0.0 0.2 8 36 2.82111E+12 46.6 0.0 8.3 9 36 1.0156E+14 1,679.2 1.7 299.0 10 36 3.65616E+15 60,452.4 60.5 10,763.7 Alphanum 4 62 14776336 0.0 0.0 0.0 5 62 916132832 0.0 0.0 0.0 10/52 letters 6 62 56800235584 0.9 0.0 0.2 7 62 3.52161E+12 58.2 0.1 10.4 8 62 2.1834E+14 3,610.1 3.6 642.8 9 62 1.35371E+16 223,827.5 223.8 39,852.9 Complex 4 107 131079601 0.0 0.0 0.0 5 107 14025517307 0.2 0.0 0.0 6 107 1.50073E+12 24.8 0.0 4.4 7 107 1.60578E+14 2,655.1 2.7 472.7 8 107 1.71819E+16 284,091.6 284.1 50,583.1 Brute-Force Days 0.0 0.9 92.6 9,259.3 1.6 2,015.5 72,559.4 2,612,138.8 94,036,996.9 3,385,331,888.9 13.7 848.3 52,592.8 3,260,754.3 202,166,764.4 12,534,339,394.7 121.4 12,986.6 1,389,565.1 148,683,470.0 15,909,131,294.7 ios on device

Platform vs. Plattform Managed Devices (MDM), COPE lication BYOD Platform lication Consumer lication Platform