White Paper. Data Security. journeyapps.com



Similar documents
White Paper. Data Security. The Top Threat Facing Enterprises Today

Technical White Paper. The JourneyApps Platform. journeyapps.com

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Security and Privacy Considerations for BYOD

Codeproof Mobile Security & SaaS MDM Platform

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Enterprise Mobility Management

Data Protection Act Bring your own device (BYOD)

Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

BENEFITS OF MOBILE DEVICE MANAGEMENT

Addressing NIST and DOD Requirements for Mobile Device Management

Kaspersky Security for Mobile

THE BLUENOSE SECURITY FRAMEWORK

Microsoft Windows Intune: Cloud-based solution

Guideline on Safe BYOD Management

Using AWS in the context of Australian Privacy Considerations October 2015

MobileIron Support. Table of Contents. 1. Introduction. 2. Supported Features. Version November 2015

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Central Agency for Information Technology

HELPFUL TIPS: MOBILE DEVICE SECURITY

Data Protection Act Guidance on the use of cloud computing

Securing your Mobile Workforce with Okta and Espion

How To Manage A Mobile Device Management (Mdm) Solution

When enterprise mobility strategies are discussed, security is usually one of the first topics

We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

Security Overview Enterprise-Class Secure Mobile File Sharing

Kony Mobile Application Management (MAM)

BYOD Policy for [AGENCY]

Live Guide System Architecture and Security TECHNICAL ARTICLE

[BRING YOUR OWN DEVICE POLICY]

Miami University. Payment Card Data Security Policy

Managing Mobility in the BYOD Era:

Vodafone Total Managed Mobility

Bell Mobile Device Management (MDM)

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

TouchDown for Android

The Security Behind Sticky Password

Ensuring the security of your mobile business intelligence

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Mobile First Government

BYOD: End-to-End Security

Top 10 Cloud Risks That Will Keep You Awake at Night

Feature List for Kaspersky Security for Mobile

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Mobility Challenges & Trends The Financial Services Point Of View

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Mobile Device Management for CFAES

Enterprise level security, the Huddle way.

FMCS SECURE HOSTING GUIDE

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Samsung SDS. Enterprise Mobility Management

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Systems Manager Cloud Based Mobile Device Management

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

CHIS, Inc. Privacy General Guidelines

Oracle Mobile Security

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Paxata Security Overview

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in

A guide to enterprise mobile device management.

Systems Manager Cloud-Based Enterprise Mobility Management

AVLOR SERVER CLOUD RECOVERY

ios Education Deployment Overview

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Enterpise Mobility Lexicon & Terminology

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Supplier Information Security Addendum for GE Restricted Data

Copyright 2013, 3CX Ltd.

An Enterprise Approach to Mobile File Access and Sharing

Hands on, field experiences with BYOD. BYOD Seminar

Cloud Computing Security: Public vs. Private Cloud Computing

Security Architecture Whitepaper

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Transcription:

White Paper Data Security

CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management What Happens When a Device is Lost or Stolen? Further Recommendations Mobile Device Management (MDM) Mobile Application Management (MAM) Dual Persona Approach Looking Forward About JourneyApps 04 04

The JourneyApps Commitment to Security Security is the top mobility challenge facing enterprises today, and the ability to meet security requirements is now a critical factor when evaluating possible mobile vendors. JourneyApps is committed to offering a highly secure platform and has consistently been on the forefront of data security. Various security measures are built into the JourneyApps Platform and anyone using apps built on the JourneyApps Platform will benefit from these world-class security measures by default. Geographic Location of Cloud Hosting The JourneyApps cloud-based App Backend is available in multiple regions, and the region where your data is hosted can be configured based on where you are located. Being able to select the geographic location of where your data is hosted, makes it easier to comply with Data Security legislation. For example, it is easier to comply with the EU Data Protection Directive if you host data in the EU, and the same with the Protection of Personal Information Act in South Africa, and the Patriot Act in the United States. Once a location has been selected, all of the data for that specific app will be stored in the selected geographic region. In most regions the back-end is hosted on Amazon Web Services Elastic Compute Cloud (EC2). In other regions such as Africa and the Middle East, equivalent hosting providers are used with regard to security and reliability. The current supported regions are: Region Geographic Location Infrastructure Provider United States Virginia Amazon Web Services European Union Ireland Amazon Web Services Asia-Pacific Sydney, Australia Amazon Web Services Middle East and Africa South Africa Hetzner Infrastructure-Level Security The JourneyApps back-end is hosted on Amazon Web Services Elastic Compute Cloud (EC2), which provides world-class security measures and certifications for infrastructure-level security. For more details, refer to the AWS Security Whitepaper and the AWS Risk and Compliance Whitepaper. All JourneyApps servers have protections and access controls built in to ensure that no unauthorized access your data can occur. Data is backed up daily and is stored off-site in a secure data centre. Access and security policies for Journey technical staff performing maintenance on infrastructure conforms with the highest industry security standards. Journey servers are equipped with firewalls to restrict network access. Servers are penetration-tested and operating system upgrades, patches and infrastructure software updates are applied on a regular basis. As a further security measure, JourneyApps makes use of extensive audit trails: Any data modifications on the platform, as well as many other activities, are monitored and recorded. Audit trails are securely stored

in line with best practice. Access to customer data for troubleshooting and support services by JourneyApps personnel is tightly controlled and audited. Protection of Data Through Encryption All communication between mobile devices and Journey servers occur over a Transport Layer Security (TLS) encrypted channel. Journey mobile apps use a secure temporary enrolment token to link itself to the Journey App Back-end and mobile devices authenticate against the Journey servers on each network request. Data is protected in various states: State Definition Encrypted in JourneyApps? Encryption Details At Rest When data is stored in the cloud in the JourneyApps App Backend Yes Block storage encryption (AWS) In Transit When data is transferred over the internet Yes TLS/HTTPS for all network communications In Use When data is handled on the mobile device Yes Full on-device encryption of data Data Life Cycle Management When a relationship with a customer comes to an end, JourneyApps deletes all data associated with that customer s solution. A customer can request a copy of the data, in which case a data download can be made to a client-specified storage unit before being deleted. Backups are kept for 2 months, and data modification audit logs are held for 3 years. Data can also be removed from backup storage on request. Therefore all data can be handed over to clients and will be completely removed from Journey servers, as well as backups if need be. Data always remains the property of the customer. What Happens When a Device is Lost or Stolen? One of the weakest links in the security chain is still the user. The JourneyApps Platform ensures that business information is kept secure on devices, even if they are lost or stolen. User profiles can be easily disabled on the JourneyApps back-end, which will unlink the user from the mobile app and the app will no longer function. The container app does not contain any customer-specific code such as data models or business logic. Data models and business logic are updated over-the-air once the user has been authenticated. If users are unlinked, they will no longer have access. On-device encryption on both ios and Android, as well as optional PIN or password restricted access to apps, ensures that if an unauthorised person gains access to a device, they still won t be able to access the app without the necessary PIN code or password.

Further Recommendations In addition to the security measures that are baked into the JourneyApps platform, there are a host of added security measures available to enterprises. This includes configuring operating system level security settings on mobile devices as an added security measure. This includes, but is not limited to: requiring the user to authenticate using a PIN code every time when the screen is unlocked, wiping the device if a predefined number of incorrect PIN attempts are made, and encrypting the entire file system (if available). Enterprises can also use third party Mobile Application Management (MAM) or Mobile Device Management (MDM) services, or Dual Personas, to increase security. Mobile Device Management (MDM) Mobile device management software is usually implemented through a third party and helps companies ensure that employees do not breach corporate policies. MDM software deals with aspects such as corporate data segregation, securing documents and emails, and enforcing corporate policies. It can also apply virtual geographic limits for devices and includes monitoring capabilities that allow enterprises to track and report on information about mobile devices across the enterprise of both company-owned devices and devices belonging to employees. MDM solutions can manage device firmware and configuration settings and can remotely wipe data or locate devices. Mobile Application Management (MAM) MAM can optionally be used to distribute custom-branded versions of the Journey Launcher to a customer s user base. These versions of the Journey Launcher native container app will sport the name and icon of the customer, whilst under the hood still working exactly the same as the Journey-branded Launcher in the Google Play Store and itunes App Store. MAM provides a lower degree of control over the device and focuses on the management of applications. MAM provisions and controls access to internally developed and commercially available mobile apps used on both company owned and personal devices. It enables IT administrators to distribute, update and manage secure applications, as well as configure apps and provision users. MAM also allows for the monitoring and tracking of usage, and companies can easily disable or restrict roles. MDM and MAM solutions should install malware protection on the device that scans for viruses and quarantines affected applications and files on devices. Dual Persona Approach If companies do enforce a BYOD policy, they can use a Dual Persona Approach as an added security measure. On one device there can be a work persona for all work-related tools and communications, and a separate one for personal communication. Organizations can secure work-related content and comply with security policies, and also remotely wipe only work-related content. By doing this, the organization respects the employee s privacy and can even create separate phone numbers for work and personal use.

Looking Forward Maintaining appropriate levels of data security will remain one of the biggest challenges for enterprises in the future and enterprises can rest assured that their data is safe with JourneyApps. About JourneyApps At JourneyApps we build mobile apps that are customised to suit your unique business processes. If you have a mobile workforce, we can help you find efficiencies and address specific business challenges. The JourneyApps platform helps you build robust applications on Android, ios and Chrome and adheres to the highest security standards. Our team of engineers has years of experience in building mobile apps and understand your needs. They will help brainstorm around your processes and will provide a simple and easy-to-use solution. And we build fast, so we will assist you in proving success quickly and can iterate and deploy on-the-go. We have deployed solutions in sectors such as financial services, asset management, logistics, field service, healthcare, agriculture and market research. Each month thousands of people use the JourneyApps solutions and we process tens of thousands of job cards, delivery notes, incident reports, etc. Talk to one of our mobility experts today about how we can help your mobile workforce become more efficient. Learn more about JourneyApps hello@ 04

Creating business solutions with mobile apps. Fast. United States 973 E. San Carlos Ave. San Carlos California 94070 Phone: +1 (650) 353-3292 South Africa Unit 109, Block C Bosman s Crossing Square Distillery Road Stellenbosch, 7599 Phone: +27 (0)21 880 8250 Australia Level 20, Tower 2 2 Sussex Street Sydney 2000 Phone: (+61) 1300 780 319