Chris Boykin VP of Professional Services



Similar documents
Mobile Device Management for CFAES

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Guideline on Safe BYOD Management

ForeScout MDM Enterprise

The ForeScout Difference

Kaspersky Security for Mobile

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Symantec Mobile Management for Configuration Manager 7.2

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Device Strategy

Symantec Mobile Management 7.2

Hands on, field experiences with BYOD. BYOD Seminar

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Embracing Complete BYOD Security with MDM and NAC

Feature List for Kaspersky Security for Mobile

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

IT Resource Management & Mobile Data Protection vs. User Empowerment

Mobile device and application management. Speaker Name Date

Best practices for mobile data protection

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Zenprise Device Manager 6.1.5

Smart Givaudan. From BYOD experience to new mobile opportunities

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Bring Your Own Device Mobile Security

Cisco Mobile Collaboration Management Service

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Total Enterprise Mobility

Symantec Mobile Management 7.1

Security and Compliance challenges in Mobile environment

Symantec Mobile Management Suite

How To Protect Your Mobile Devices From Security Threats

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

MobileIron and Samsung Value Proposition

Generating leads with Meraki's Systems Manager. Partner Training"

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Ben Hall Technical Pre-Sales Manager

Systems Manager Cloud Based Mobile Device Management

Securing Corporate on Personal Mobile Devices

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

ADDING STRONGER AUTHENTICATION for VPN Access Control

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

ios Enterprise Deployment Overview

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Mobile Device Security Is there an app for that?

BYOD: End-to-End Security

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

ITSM & Enterprise Mobility Management

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Sophos Mobile Control - Competitive Overview

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Bell Mobile Device Management (MDM)

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

How to Successfully Roll Out an Android BYOD Program

Ensuring the security of your mobile business intelligence

Securing mobile devices in the business environment

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

GETS AIRWATCH MDM HANDBOOK

Corporate-level device management for BlackBerry, ios and Android

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Mobile Security Mobile Device Management Mobile Application Management

Device Independence - BYOD -

The User is Evolving. July 12, 2011

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Thanks for joining We ll start at 10am

Advanced Configuration Steps

Kony Mobile Application Management (MAM)

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Enterprise Mobility Services

Practical Attacks against Mobile Device Management Solutions

Enterprise Mobility as a Service

Exactly the Same, but Different

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Mobile Device Management and Security Glossary

Transcription:

5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1

5/30/12 insight to the future, bringing you the best solution ahead of its time" Mobile Device Management BYOD - A Necessary Evil 2

Mobile Strategy Needed! Why?" Sub $100 Smart Phones" LTE (Long Term Evolution)" NFC (Near Field Communication)" 30 Million Devices Lost/Stolen Annually" BYOD (Bring Your Own Device)" According to Gartner:" Mobility is the fastest growing technology" 3 to 5 Mobile Devices per user" 1 of 8 employees have tablets" More mobile devices in the workplace than PC s by 2015" Agenda! Trends in Mobile Devices" Mobile Device Threats" Mitigating the Threats" 3

TRENDS IN THE WORKPLACE! Trends in the Workplace! The BlackBerry standard for business is rapidly changing" Advance of newer technologies" Compatibility with Exchange" Cost of maintaining BES" Bells and Whistles attracting users " An April 2012 Gartner survey showed that 58% of enterprises have or will make ios their primary platform during the next 12 months, compared with 20% staying with BlackBerry and 9% on Android! 4

Trends in the Workplace! Gartner shows the trend increasing" 67M in 2009 to 140M in 2011" Mobile Devices in the Workplace Millions 150 100 50 67 90 140 Smart Devices 0 2009 2010 2011 Trends in the Workplace! Smart devices are in everyone s pocket" iphones" Androids" Windows" Tablets" Employees want to connect their devices to the company s Wireless Network" 5

Trends in the Workplace! BYOD (Bring Your Own Device)" Allowing employee owned devices on the corporate network" Business Drivers" Increasing costs of company owned mobile devices" Flexibility for the employee" They are doing it anyway" BYOD increases company security threats! MOBILE DEVICE THREATS! 6

Mobile Device Threats! ComputerWorld Article" #1 Threat is unauthorized mobile devices on the network " Data Theft" Accidental (Lost/Stolen devices carry enterprise data)" Intentional (Disgruntled or Short Timer employee)" Compromised Devices" iphone Jail Breaking ; Android Open Source" Network Intrusion" Backdoor entry via tethering " Malware Apps" Threats Data Theft! What data is potentially on the devices?! Corporate Email, Contacts, & Calendar" Corporate Documents" Corporate Applications" Saved Wi-Fi or VPN information for the Corporate Network" 7

Threats Compromised Devices! iphones / ipads" Jail Breaking renders the device insecure" Apple has controls and auditing in their itunes store" By default, applications are sandboxed, signed by Apple certs, and other security features enabled" Once Jail Broken, any software can be loaded including viruses, malware, and trojans! Androids" Open Source system for apps" No built in security measures on apps" Rooting makes the device less secure" Threats - Tethering! What is Tethering? 8

Threats Malware! In the first half of 2011, the growth of mobile malware was up by 273%. There has been a rapid increase in mobile malware since those statistics came out. " Recent findings indicated a 472% increase in Android malware since July 2011." Recent Mobile Malware Attacks:" Zsone (Chinese premium SMS numbers)" Google++ (records background noises, calls, and GPS info)" Cloned Games by Logastrod (22 popular games; SMS charges)" MITIGATING THE THREAT! 9

Mobility Solution Triangle! Mitigating the Threat! Create a Mobile Device Policy" 10

Mobile Device Policy! Do you have an Mobile Device Policy?" Policy Strategy?" What am I trying to accomplish?" Security focus?" Strict controls?" Protection from legal ramifications?" Do I distribute devices or BYOD? Or both?" Personal and Business separation?" Mobile Device Policy! Policy Considerations" Supported Devices" Password Enforcement" Encryption Requirement" Device Wipe (Full or Selective)" Black/Whitelisting of Apps" VPN / WiFi Restrictions" Geo-Location" Browser Filtering" Employee Contracts" 11

Mobile Device Policy Strategy! Determine the policy strategy (3 Choices)" Ban All Devices" Selectively Allow Devices" Mobile Device Management" Ban All Devices! How will you restrict and monitor unapproved use?! Wi-Fi presents no barrier for 802.1x/WPA2 for trusted employees" How will you control the # of devices per employee?! 12

Selectively Allow Devices! How do you identify allowed/disallowed devices?! Most devices connect via Wi-Fi" 3-D approach:" Detect the connection" Determine the device" Do something about it" 3-D Approach: Detect Determine Do! Valid credentials from an employee can grant access from multiple devices" MAC Address Filtering is not sufficient or practical" 13

NETWORK ACCESS CONTROL! Mobility Solution Triangle! NAC is a vital component to Mobility Management" 14

Network Access Control (NAC)! Helps solve a missing component in MDM" Extends beyond the SmartPhone and Tablets" Works on Wireless or Wired connections" Gives visibility to who and what is connecting" Network Access Control (NAC)! 3-D Approach! Detect" Recognizes a new device coming onto the network! Determine" Runs reconnaissance to discover device type, OS, status, versions, apps, etc. (Clientless)! Do" Enforces policies based on device type, user, AD groups, etc.! 15

IP ADDRESS MANAGEMENT! Mobility Solution Triangle! IPAM is critical for a stable network environment" 16

IP Address Management! Can my network handle 3x to 5x more IP s?! DHCP Scope Size" Devices changing wireless networks constantly" Holding on to multiple IP addresses from a DHCP pool" " IP Address Management! Spreadsheets OUCH!" Microsoft not cutting it " Limited scalability" Split scopes" Lack of redundancy" IPAM! Centralized IP Management (IPv4 and IPv6)" DHCP, DNS, DNSSEC" Automated failover and disaster recovery" Instant Reporting" IP Troubleshooting to the switch port level" " 17

MOBILE DEVICE MANAGEMENT! Mobility Solution Triangle! 18

Mobile Device Management! Visibility" Ability to identify & inventory apps, patches, OS versions" Provisioning" Ability to provision software and apps on devices" Control" Ability to control apps, enforce security measures, isolate data" Beyond ActiveSync! Exchange ActiveSync alone is lacking in these areas:" Volume of Devices" Mix of Platforms" Granular Support & Policy" Reporting" 19

MDM Gartner Report Released May 2012! Definition of a Full MDM Solution (4 Components)" Software Management" Manage and support mobile apps, content, and OS" Network Service Management" Gain info off the device (location, usage, cellular & WLAN)" Hardware Management" Asset management, provisioning, and support" Security Management" Standard device security, authentication, and encryption" MDM Gartner Report Released May 2012! Inclusion in the Report:" 100 Players in the MDM space" 75 potential for this MQ" 20 met all the criteria for the MQ! 20

2011 Gartner Magic Quadrant - MDM! Leaders: Sybase (SAP) Good Technology AirWatch MobileIron Visionaries: Zenprise Symantec McAfee 2012 Gartner Magic Quadrant - MDM! Leaders: MobileIron AirWatch Fiberlink Zenprise Good Technology Visionaries: BoxTone IBM 21

MDM Features! Device Support" ios, Android, Windows Mobile/7, Symbian, BB, PalmOS" Secure Email Gateway (Email Proxy)" Separation of Company & Personal Data" Wi-Fi & VPN Configuration" Jailbreak / Root Detection" Remote Selective and Full Wipe; Remote Lock" Device Functionality Controls (camera, bluetooth, etc)" Geo-Location" Secure Browser" MDM Features (con t)! Document Repository" Intuitive GUI" Remote Control / Help Desk" Enterprise App Store" Robust Reporting" Usage Management (calls, data, SMS)" Multiple Deployment Models" SaaS(Cloud), On-Premises, or Hybrid" Multiple Deployment Methods " SMS, Self-Serve Portal, Email" 22

Implementation Lessons Learned! Apple Development Certificate" Requires Enterprise Dev. Cert if using In-House Apps" Device Support BYOD" Android requires Touchdown (extra costs)" Tech Support" Who supports the BYOD Devices?" Consider End User Experience" Consider your Deployment Plan & Ongoing Management" Network Capabilities" Bandwidth" WAP s" IP Address Management (IPAM)" Mobility Solution Triangle! 23

Take Aways! BYOD and the Threats are Real" Develop a Mobile Policy" " Use a combined MDM, NAC, and IPAM solution" Chris Boykin chris.boykin@fcltd.net 281-610- 0702 www.myfuturecom.com 24