5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1
5/30/12 insight to the future, bringing you the best solution ahead of its time" Mobile Device Management BYOD - A Necessary Evil 2
Mobile Strategy Needed! Why?" Sub $100 Smart Phones" LTE (Long Term Evolution)" NFC (Near Field Communication)" 30 Million Devices Lost/Stolen Annually" BYOD (Bring Your Own Device)" According to Gartner:" Mobility is the fastest growing technology" 3 to 5 Mobile Devices per user" 1 of 8 employees have tablets" More mobile devices in the workplace than PC s by 2015" Agenda! Trends in Mobile Devices" Mobile Device Threats" Mitigating the Threats" 3
TRENDS IN THE WORKPLACE! Trends in the Workplace! The BlackBerry standard for business is rapidly changing" Advance of newer technologies" Compatibility with Exchange" Cost of maintaining BES" Bells and Whistles attracting users " An April 2012 Gartner survey showed that 58% of enterprises have or will make ios their primary platform during the next 12 months, compared with 20% staying with BlackBerry and 9% on Android! 4
Trends in the Workplace! Gartner shows the trend increasing" 67M in 2009 to 140M in 2011" Mobile Devices in the Workplace Millions 150 100 50 67 90 140 Smart Devices 0 2009 2010 2011 Trends in the Workplace! Smart devices are in everyone s pocket" iphones" Androids" Windows" Tablets" Employees want to connect their devices to the company s Wireless Network" 5
Trends in the Workplace! BYOD (Bring Your Own Device)" Allowing employee owned devices on the corporate network" Business Drivers" Increasing costs of company owned mobile devices" Flexibility for the employee" They are doing it anyway" BYOD increases company security threats! MOBILE DEVICE THREATS! 6
Mobile Device Threats! ComputerWorld Article" #1 Threat is unauthorized mobile devices on the network " Data Theft" Accidental (Lost/Stolen devices carry enterprise data)" Intentional (Disgruntled or Short Timer employee)" Compromised Devices" iphone Jail Breaking ; Android Open Source" Network Intrusion" Backdoor entry via tethering " Malware Apps" Threats Data Theft! What data is potentially on the devices?! Corporate Email, Contacts, & Calendar" Corporate Documents" Corporate Applications" Saved Wi-Fi or VPN information for the Corporate Network" 7
Threats Compromised Devices! iphones / ipads" Jail Breaking renders the device insecure" Apple has controls and auditing in their itunes store" By default, applications are sandboxed, signed by Apple certs, and other security features enabled" Once Jail Broken, any software can be loaded including viruses, malware, and trojans! Androids" Open Source system for apps" No built in security measures on apps" Rooting makes the device less secure" Threats - Tethering! What is Tethering? 8
Threats Malware! In the first half of 2011, the growth of mobile malware was up by 273%. There has been a rapid increase in mobile malware since those statistics came out. " Recent findings indicated a 472% increase in Android malware since July 2011." Recent Mobile Malware Attacks:" Zsone (Chinese premium SMS numbers)" Google++ (records background noises, calls, and GPS info)" Cloned Games by Logastrod (22 popular games; SMS charges)" MITIGATING THE THREAT! 9
Mobility Solution Triangle! Mitigating the Threat! Create a Mobile Device Policy" 10
Mobile Device Policy! Do you have an Mobile Device Policy?" Policy Strategy?" What am I trying to accomplish?" Security focus?" Strict controls?" Protection from legal ramifications?" Do I distribute devices or BYOD? Or both?" Personal and Business separation?" Mobile Device Policy! Policy Considerations" Supported Devices" Password Enforcement" Encryption Requirement" Device Wipe (Full or Selective)" Black/Whitelisting of Apps" VPN / WiFi Restrictions" Geo-Location" Browser Filtering" Employee Contracts" 11
Mobile Device Policy Strategy! Determine the policy strategy (3 Choices)" Ban All Devices" Selectively Allow Devices" Mobile Device Management" Ban All Devices! How will you restrict and monitor unapproved use?! Wi-Fi presents no barrier for 802.1x/WPA2 for trusted employees" How will you control the # of devices per employee?! 12
Selectively Allow Devices! How do you identify allowed/disallowed devices?! Most devices connect via Wi-Fi" 3-D approach:" Detect the connection" Determine the device" Do something about it" 3-D Approach: Detect Determine Do! Valid credentials from an employee can grant access from multiple devices" MAC Address Filtering is not sufficient or practical" 13
NETWORK ACCESS CONTROL! Mobility Solution Triangle! NAC is a vital component to Mobility Management" 14
Network Access Control (NAC)! Helps solve a missing component in MDM" Extends beyond the SmartPhone and Tablets" Works on Wireless or Wired connections" Gives visibility to who and what is connecting" Network Access Control (NAC)! 3-D Approach! Detect" Recognizes a new device coming onto the network! Determine" Runs reconnaissance to discover device type, OS, status, versions, apps, etc. (Clientless)! Do" Enforces policies based on device type, user, AD groups, etc.! 15
IP ADDRESS MANAGEMENT! Mobility Solution Triangle! IPAM is critical for a stable network environment" 16
IP Address Management! Can my network handle 3x to 5x more IP s?! DHCP Scope Size" Devices changing wireless networks constantly" Holding on to multiple IP addresses from a DHCP pool" " IP Address Management! Spreadsheets OUCH!" Microsoft not cutting it " Limited scalability" Split scopes" Lack of redundancy" IPAM! Centralized IP Management (IPv4 and IPv6)" DHCP, DNS, DNSSEC" Automated failover and disaster recovery" Instant Reporting" IP Troubleshooting to the switch port level" " 17
MOBILE DEVICE MANAGEMENT! Mobility Solution Triangle! 18
Mobile Device Management! Visibility" Ability to identify & inventory apps, patches, OS versions" Provisioning" Ability to provision software and apps on devices" Control" Ability to control apps, enforce security measures, isolate data" Beyond ActiveSync! Exchange ActiveSync alone is lacking in these areas:" Volume of Devices" Mix of Platforms" Granular Support & Policy" Reporting" 19
MDM Gartner Report Released May 2012! Definition of a Full MDM Solution (4 Components)" Software Management" Manage and support mobile apps, content, and OS" Network Service Management" Gain info off the device (location, usage, cellular & WLAN)" Hardware Management" Asset management, provisioning, and support" Security Management" Standard device security, authentication, and encryption" MDM Gartner Report Released May 2012! Inclusion in the Report:" 100 Players in the MDM space" 75 potential for this MQ" 20 met all the criteria for the MQ! 20
2011 Gartner Magic Quadrant - MDM! Leaders: Sybase (SAP) Good Technology AirWatch MobileIron Visionaries: Zenprise Symantec McAfee 2012 Gartner Magic Quadrant - MDM! Leaders: MobileIron AirWatch Fiberlink Zenprise Good Technology Visionaries: BoxTone IBM 21
MDM Features! Device Support" ios, Android, Windows Mobile/7, Symbian, BB, PalmOS" Secure Email Gateway (Email Proxy)" Separation of Company & Personal Data" Wi-Fi & VPN Configuration" Jailbreak / Root Detection" Remote Selective and Full Wipe; Remote Lock" Device Functionality Controls (camera, bluetooth, etc)" Geo-Location" Secure Browser" MDM Features (con t)! Document Repository" Intuitive GUI" Remote Control / Help Desk" Enterprise App Store" Robust Reporting" Usage Management (calls, data, SMS)" Multiple Deployment Models" SaaS(Cloud), On-Premises, or Hybrid" Multiple Deployment Methods " SMS, Self-Serve Portal, Email" 22
Implementation Lessons Learned! Apple Development Certificate" Requires Enterprise Dev. Cert if using In-House Apps" Device Support BYOD" Android requires Touchdown (extra costs)" Tech Support" Who supports the BYOD Devices?" Consider End User Experience" Consider your Deployment Plan & Ongoing Management" Network Capabilities" Bandwidth" WAP s" IP Address Management (IPAM)" Mobility Solution Triangle! 23
Take Aways! BYOD and the Threats are Real" Develop a Mobile Policy" " Use a combined MDM, NAC, and IPAM solution" Chris Boykin chris.boykin@fcltd.net 281-610- 0702 www.myfuturecom.com 24