Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013
Today s Speakers Clint Adams, CISSP Director, Mobility Solutions MaaS360 by Fiberlink Keith Glynn, CISSP Sr. Technical Solution Engineer ForeScout Technologies 3
The BYOD Revolution 95% Already said yes to BYOD Source: http://newsroom.cisco.com/release/854754/cisco-study-it-saying-yes-to-byod http://www.eweek.com/c/a/enterprise-networking/cisco-enterprises-are-embracing-byod-252679/ 4
Top IT Management Concerns Source: Infoworld / Forrester http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973 5
How to get it done? 6
10 Steps to BYOD Implementation 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10. Implement solutions 7
Poll Question 1 How far along is your organization in completing the 10 steps to BYOD implementation? a) Completed 1 to 3 steps b) Completed 4 to 6 steps c) Completed 7 to 9 steps d) All 10 steps completed 8
Gartner Recommendations http://www.gartner.com/technology/topics/byod.jsp 9
Gartner Recommendations Combine NAC and mobile device management (MDM) to enforce policies in a BYOD environment. Personally owned devices that are not managed by MDM agents should be limited to Internet access only, or placed in a limited access zone where they can access a subset of applications and network resources as per user/group role. 1 The network security team should be part of the overall project team that defines how BYOD will be supported. NAC should be an integral component of the overall architecture, so that the network has the ability to restrict access to devices that are noncompliant with BYOD policies. 2 1 Gartner, Securing BYOD With Network Access Control, a Case Study, 29 August 2012, Lawrence Orans 2 Gartner, Getting Your Network Ready for BYOD, 28 September 2012, Lawrence Orans 10
MDM + NAC: 1 + 1 = 3 MDM focus is mobile device NAC focus is network Visibility MDM Alone NAC Alone MDM + NAC Full info on managed mobile devices only Basic info on managed and unmanaged devices Complete Network Access Control None Full Complete Compliance Mobile devices PCs, Mac, Linux Complete Deploy Agent Pre-registration Network based Both 11
Network Access Control (NAC) 12
What is Network Access Control (NAC)? Technology that identifies users and network-attached devices and automatically enforces security policy. LIMITED FIXED 13
ForeScout NAC Real-time Network Asset Intelligence Device type owner, login, location Applications, security profile Policy-based Network Controls Grant access, register guests Limit or deny access Automated Endpoint Enforcement Remediate OS, configuration, security agents Start/stop applications, disable peripherals Block worms, zero-day attacks, unwanted apps Phased-in, manual or fully automated X 14
ForeScout Market Leadership *Magic Quadrant for Network Access Control, December 2012, Gartner Inc. *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Garnter, Inc. "Magic Quadrant for Network Access Control," Report G00238941, December 3, 2012, Lawrence Orans, John Pescatore. 15
Mobile Device Management (MDM) 16
MDM/EMM is Integral for BYOD Supports BYOD with self-service enrollment Configure devices and protect employee privacy Enforce security policies and meet regulations Push content, apps and docs to separate workspaces 17
Current MDM Best Practices Device ios: ~80% of all enterprise devices. Leading BYOD choice. Android: Standards to reduce fragmentation. Tablets in field operations. Policy: Password, Require device encryption, Email/EAS configuration Integration AD/LDAP: 15% integrate for device enrollment & app/doc access Email Access Control: 20% quarantine new devices w/o MDM Apps Docs App Catalog: 80% of companies pushing apps Enterprise Apps: 25% of companies pushing enterprise apps Enterprise Apps: On average 6 apps per business. Median is 3. Containerize specific workflows / use cases: 40% of customers use Doc Mgmt Specific LOB use cases sales materials, BOD materials, flight materials 18
Comprehensive Mobility Management The Essentials SMS, email, or URL enrollment Email, calendar, contact profiles VPN and Wi-Fi settings Device feature configuration Policy updates & changes Inventory management Compliance reporting Device Enrollment, Acceptable Use OTA Configuration Advanced Management Mobile app management Document sharing Event-based policies Proactive expense controls BYOD privacy settings Shared device support Self service portal Enterprise App Catalog Location-based policies 19 19
Robust Mobile Security Device Encryption and passcodes Jailbreak/Root detection Locate, lock, wipe Email Auto-quarantine/access approval Contain emails and attachments Remote wipe of work email Applications Blacklist/Whitelist mobile apps Wrapping and compliance rules Remote wipe of managed apps Documents Password authentication Restrict copy, paste, share Remote wipe of work files Web Define URL filters and categories Allow access to intranet sites Disable native/3 rd party browsers Network Configure Wi-Fi and VPN profiles Cert delivery and authentication Dynamic policy based on SSID 20
MaaS360 Enterprise Mobile Security Dual Persona to separate personal and work data in the BYOD era Secure Mail Application Security Secure Document Sharing Secure Browser A Trusted WorkPlace container for seamless security and productivity 21
Why Choose Comprehensive MDM? Provide options to address multiple use cases Protects corporate resources and reduces risk of data loss Preserves the native experience on the device Allows you to manage the data even if employee owned Platform choice and device type left to end user ***** * Device Level App/Doc Level App Catalog App Wrapping Doc Catalog Enterprise Level Work 22
Why Customers Love MaaS360 Proven approach to cloud mobility management Powerful features to address the full mobility lifecycle Secure containers to separate work and play Exchange AD/LDAP Lotus BES Certs Seamless integration with all your existing infrastructure Simple and fast with an exceptional experience 23
Integrated ForeScout + MaaS360 24
MaaS360 Integration with ForeScout NAC Cloud Extender Exchange/ Office 365 AD/LDAP Lotus BES Certs ForeScout MDM Console ForeScout CounterACT Unified visibility Unified access policy Unified reporting Automated MDM enrollment On-access assessment Block malicious activity 25
Unified Visibility 26
Unified Reporting 27
Integration Benefit: Automated MDM Enrollment Manual Enrollment User calls help desk Help desk asks questions Help desk sends MDM enroll info Network team sets policy exception to access MDM app User enrolls device in MDM Network team reset policy exception ForeScout Auto Enrollment User connects Identified, Classified, Authenticated MDM Enrolled 28
Integration Benefit: Greater Security with On-Access Compliance Assessment Device connects to network CounterACT asks MDM to provide real-time compliance assessment If device is not-compliant, CounterACT blocks device and sends message to end-user After end-user corrects the problem, MDM confirms compliance, then CounterACT allows the device onto the network MDM ) ) ) ) ) ) ) Recheck? ForeScout CounterACT Your Enterprise Network 29
Efficiency Security MDM + NAC Integration Benefits + Complete visibility of all mobile devices on the network Prevent unauthorized devices from accessing the network. Automated enrollment process for new mobile devices Unified compliance reporting for all endpoints on the network. 30
Poll Question 2 Has your organization deployed an MDM and/or NAC solution? a) Mobile Device Management b) Network Access Control c) A combination of NAC and MDM d) Not using either at this time 31
Large Bank BYOD Case Study Challenge and approach The Challenge Large financial services company. More than 100,000 endpoints, 200 locations worldwide. Needed to support 10,000 BYOD smartphones, tablets and laptops Project Plan Risk and compliance team led the project Identified use cases for smartphones, tablets, laptops Defined security requirements and policies Selected security controls Security controls ForeScout CounterACT NAC Fiberlink MaaS360 MDM Citrix Receiver Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 32
Large Bank BYOD Case Study Use Case 1: Employee-Owned Tablets and Smartphones MDM required for device to gain access to wireless BYOD network MDM solution selected must integrate with NAC solution MDM provides device compliance information to NAC solution NAC facilitates enrollment into MDM NAC initiates on-access compliance assessment by MDM Devices supported: Apple, Android, Windows Phone, BlackBerry Security policies If the device has an MDM agent, NAC grants access to a separate wireless BYOD network Citrix Systems' Receiver agent provides access to a subset of applications on the corporate network, based on the user's profile, thereby creating a limited-access zone If the device does not have an MDM agent, NAC limits the device to Internet access only If the device has been jailbroken or rooted (as determined by the MDM agent), the NAC system denies access Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 33
Large Bank BYOD Case Study Use Case 2: Employee-Owned Windows Laptops NAC used to enforce Windows security policies Up-to-date patches are required Up-to-date antivirus signatures are required Disk encryption is required Specific ports must be blocked via a personal firewall (such as Telnet/SSH) Optional NAC agent must be enabled Data loss prevention (DLP) agent is required Actions If the Windows laptop is compliant with all six of the policy criteria, it is granted full access to the corporate network If the Windows laptop is noncompliant, it is limited to Internet access only The user is provided details on non-compliance and offered means to conform If conformed, user is automatically re-checked and allowed access Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 34
Large Bank BYOD Case Study Use Case 3: Employee-Owned MacBook Laptops NAC used to enforce Mac OS security policies Must be running OS 10.5 or later. Optional NAC agent or agentless approach must be enabled. DLP agent is required. Actions: If the MacBook is compliant with all three of the policy criteria, it is granted full access to the corporate network. If the MacBook is noncompliant with one or more of the policies, it is limited to Internet access only. Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 35
Large Bank BYOD Case Study Phased Approach Phase 1 A pilot project in which 200 IT staffers brought personally owned devices to work. This phase lasted six months, during which time the project team refined the policies Phase 2 1,000 employee-owned devices owned by employees in the information risk management, team. The goal was to assess end-user experience and the overall performance of the solution Phase 3 All employees and contractors may participate. By year-end 2014, the company expects that about10,000 personally owned devices will be supported Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 36
Large Bank BYOD Case Study: Results 85% of devices are Windows, 10% are smartphones and tablets, 5% are MacBooks The BYOD initiative has added 1% to total number of endpoints 1 FTE supports entire BYOD and NAC initiative (100,000 endpoints total) Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 37
Large Bank BYOD Case Study: Recommendations Combine NAC and MDM to enforce policies in a BYOD environment. Personally owned devices that are not managed by MDM agents should be limited to Internet access only, or placed in a limited access zone where they can access a subset of applications and network resources as per user/group role BYOD policies should be broad-based and protect the wired and wireless networks. Use cases should address smartphones and tablets that need wireless access, as well as laptops (Mac and Windows) that need wired access Gartner Case Study: Securing BYOD With Network Access Control, Published: August 2012, Lawrence Orans, Doc. G00226207 http://blog.forescout.com/gartner-case-study-securing-byod/ 38
Thank You *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service ]depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 39 ***Frost & Sullivan chart from 2013 market study Analysis of the Network Access Control Market: Evolving Business Practices and Technologies Rejuvenate Market Growth Base year 2012, n-20
Thank you for joining! Follow-up: kglynn@forescout.com cadams@fiberlink.com Questions? 40