BYOD(evice) without BYOI(nsecurity)



Similar documents
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Empowering Students with Mobility and BYOD Technology

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Cisco Secure BYOD Solution

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Mobile and BYOD Strategy

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

Smart Givaudan. From BYOD experience to new mobile opportunities

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Secure Your Mobile Device Access with Cisco BYOD Solutions

Readiness Assessments: Vital to Secure Mobility

The flexible workplace: Unlocking value in the bring your own device era

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Delivering Control with Context Across the Extended Network

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

If you can't beat them - secure them

BT One. Analyst and consultant update, September BT One. Communications that unify 1

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Mobilizing Business Applications, Efficiently and Affordably

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

What Is Cisco Mobile Workspace Solution?

Hands on, field experiences with BYOD. BYOD Seminar

Bring Your Own Device

Preparing your network for the mobile onslaught

Solutions for admission control and data loss prevention in a modern corporate network

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Cisco TrustSec Solution Overview

Symantec Mobile Management Suite

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Secure Network Access for Personal Mobile Devices

Securing and Monitoring BYOD Networks using NetFlow

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

How To Protect Your Mobile Devices From Security Threats

Securing BYOD With Network Access Control, a Case Study

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Simplifying Desktop Mgmt With Novell ZENworks

How To Support Bring Your Own Device (Byod)

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Welcome to the era of the anywhere worker

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Generating leads with Meraki's Systems Manager. Partner Training"

trends and audit considerations

SANS Mobility/BYOD Security Survey

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

How To Make Your Computer System More Secure And Secure

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Security and Compliance challenges in Mobile environment

Executive Summary P 1. ActivIdentity

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

What We Do: Simplify Enterprise Mobility

THE EDGE OF TOMORROW JUST HAPPENS TO BE TODAY. EXPLORE THE INTERNET OF EVERYTHING.

Chris Boykin VP of Professional Services

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

How to Turn the Promise of the Cloud into an Operational Reality

Cisco Validated Design

Cisco Validated Design

ADDING STRONGER AUTHENTICATION for VPN Access Control

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Optimizing the Mobile Cloud Era Through Agility and Automation

Maximizing Your Desktop and Application Virtualization Implementation

The Evolution of Traditional Telecoms to IP Communications

Device Independence - BYOD -

SA Series SSL VPN Virtual Appliances

Tom Schauer TrustCC cell

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Cisco s BYOD / Mobility

Transcription:

BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate

Agenda Drivers for Bring Your Own Device (BYOD) Industry Cardinal Health business Current state BYOD implementation Vision Security guiding principles Approach and timeline Lessons learned 2 D

Cardinal Health Leading provider of products and services across the healthcare supply chain Extensive footprint across multiple channels Serving >40,000 customers with renewed focus Approximately 30,000 employees with direct operations in 10 countries >$103B FY11 pro forma revenue* Number 19 on the Fortune 500 list Broadest view of the healthcare supply chain 3 D

Changing Industry & Consumerization Estimated 10 billion smart phones by 2014 Android & ios sales brisk over last 2 years Consumers now largest computing purchaser Consumerization impacts business environs Global ICT development, 2000-2010 What devices do you use for work? Nextbigfuture.com Source: Forrester Q2 2011 US Workforce Technology & Engagement Survey 4 G

Business Drivers To Change Growth Strategy Cost Efficiency Client Satisfaction Productivity Improvement Collaboration/ Communication Enabling New Business Opportunities Securing the Environment Regulatory Compliance Risk Call to Action 5 D

Stakeholders in the Mobile Device Environment Mobile Worker Gen Net CFO/CIO Legal Knowledge Worker 6 D

Cardinal Health SmartPhone Environment Today s Environment 1. Personal liable cell phones 2. Multiple controls 3. Strong growth in Tablets 4. Sensitive information on personal devices Impact 1. Explosion of smart phones 2. Support issues 3. Devices on the network 4. Violations of policy Today s Controls 1. Personal device waivers 4. Password screensaver enforcement 2. Remote wipe 5. Excessive password retry Wipe 3. Device level encryption 6. Some monitoring controls Will our controls support the future needs? 7 G

VDI & BYOD Vision Provide greater device flexibility and choice Reduce Cardinal Health s total cost of ownership Leverage the benefits of new technology Support a mobile workforce application access, anywhere, anytime, anyplace Embrace consumerization of IT, leverage new strategies for optimizing employee productivity Transition to self service model Improve security through centralized data control, patching and upgrades 8 G

VDI & BYOD Principles Personal devices will not have the ability to download and save Cardinal Health information Improve Security Personal devices will not have direct access to Cardinal Health s internal network Security controls will be implemented in the Cardinal Health environment to minimize impact to personal devices Local email archives (.pst files) will not be allowed within the virtual environment 9 D

Cardinal Health s Approach to BYOD(evice) IT developed Vision and Principles Desktop Server Architecture Security Network Security solutions built into the program A program level approach that includes all non company owned devices (today and tomorrow) A common platform to support those devices 10 G

BYOD: Program Roadmap and Timeline Pilot Q1 Pilot Q2 Pilot Q3 Pilot Q4 Year 2 Year 3 Year 4 Internal Pilot VDI BYOD Ref. Architecture Managed Services Security Core Pilot Network Segmented Security Provide Recommendations Secure Program Funding Sustain Pilot Users Sustain Pilot Users 3 Year VDI Deployment 13,000 Users Dependent on VDI: Projected 10% of users over 3 years (2,000 VDI Users) Collaboration Productivity Tools Security Unified Communications Pilot Recommend Secure Program Funding Hybrid Deployment Office Collaboration tools Unified Communications (Voice/Video/IM) Web Conferencing email 11 G

Segmentation of BYOD Traffic 12 D

VDI & BYOD The Journey Isn t Complete Yet Work in Process End user acceptance Business involvement Subsidy to employees Worker segmentation Expansion & Maturity of DLP Mobile application delivery Partitioning of corporate and personal data 13 D

Application Build a collaborative approach with Business, Legal, Infrastructure, Risk & Architecture Identify user segmentation Geographical Role Common Applications Virtualize / isolate applications Security Revisit policies, particularly User Access Policy DLP & information classification Segmentation Senior leadership support to overcome resistance Realistic expectations VDI / BYOD is NOT one size fits all 14 -

15 Portions Copyright 2012, Cardinal Health, Inc. or one of its subsidiaries. All rights reserved.

Cisco s BYOD Strategy & Deployment 2012 Nasrin Rezai CTO Security WW Security Architectures Session ID: HOT-107 Session Classification: Intermediate

Cisco-on-Cisco Cisco IT Security Strategy BYOD Journey Lessons Learned

Cisco IT Strategy

Market Transitions 7 Billion New Wireless Devices by 2015 Mobile Devices Blurring the Borders Changing the Way We Work Consumer Workforce Employee Partner Physical Virtual Video projected to quadruple IP traffic by 2014 to 767 exabytes Anyone, Anywhere, Anytime IT Resources MOBILITY WORKPLACE EXPERIENCE VIDEO

Security Trends & Opportunities for Cisco IT Social networking (virtual friends ) Sophisticated Cyber attacks (Advance Persistent Threats) Cloud, XaaS (disappearing perimeter) Who I work with (Collaborative IP Protection) What I use to work (end point identification) Where I work from (location awareness) Product Strategy Accelerator Cisco-on-Cisco Success Product Direction Best Practice Leadership Securely Enable NBM s I/PaaS Offerings New revenue streams COGS Mindset

Pervasive Security Accelerator Vision CIO / CSO Cisco is secure. We will not get compromised in the marketplace. We can secure our services without slowing down my client business. We are ready because we embraced security. I am responsible for I know how to the security of my leverage the security service, and able to capabilities needed to make data-driven protect my service decisions Security does not get in the way of doing my business. I know what is expected from me. Employee We know what threats and data patterns to monitor, and how to respond Service Owner Service Architect Security Operations

PSA : Top-Level Architecture View Highly Transformational Architecture Focus Areas for PSA Governance Plane IT Governance Service Security Prime Decision Making Model (NEW role) Security Operations Security-IT OM Integration Simplified & Unified Metrics Operational Security Excellence Policy Enforcement (Control) Behavior + Threats Compliance (Visibility) Management Plane Identity & Access Secure Path / Threat Protection Data Foundational Identity Mgmt Access Policy Mgmt NG Strong/Adaptive AuthC Privileged Access Mgmt Secure Data Delivery Device Profiling / Posture Contextual Network Access Threat Detection/Mitigation Data Governance Data Visibility & Control Data Plane

BYOD Cloud Shift 1 Access Controls & Trust Access Entitlement Identity & location Guest Vendor HRE Untrusted Device Trusted Device VDI 2 Segment Services in Restricted DC (TrustSec) data Sensitive data Public data 4Enforce in the network Guest (ISE) Access (Default) VXI Only Employee Trusted Device or VXI 3 Manage through Policy (ISE)

Cisco IT BYOD Journey

BYOD Mobile Landscape Platform Dec 2009 Dec 2010 Dec 2011 iphone 2,266 9% 10,662 32% 20,581 41% ipad 0 0% 1,822 6% 8,144 16% BlackBerry 13,611 53% 15,188 46% 12,290 24% Android 0 0% 1,390 4% 5,234 10% Others 9,647 38% 4,292 12% 2,185 5% Cisco Cius 0 0% 0 0% 2,104 4% 25,524 33,354 50,538 Total Smartphones and Tablets at Cisco 4% 10% 41% 24% 16% Cisco s total mobile device count grew 52% in 12 months.

Cisco BYOD Deployment Strategy IT Managed PCs Trusted Platforms IT Virtual Apple Mac Machine laptop / registered BYOD PC Mobile Devices / Tablets Untrusted Platforms BYOD / Any PC device Mobile Devices /Tablets IT Services Help Desk Support Yes Yes No Yes No No Email Yes Yes Yes Yes Yes Yes Corporate Access (Apps, print, etc.) Yes Yes Yes Yes Limited Limited Registered / Accounted For Yes Yes Yes Yes No No Network User attribution (customer tools, Yes Yes Yes Yes Yes Yes 8021x,TrustSec) Policy Enforcement Wired/Wireless / Yes Yes Yes Yes Yes Yes Remote (ISE) Malware (WSA, ESA)- On Network Yes Yes Yes Yes Yes Yes Security Monitoring - On Network Yes Yes Yes Yes Yes Yes Direct Network Access Yes Yes Yes Yes Limited / VDI Limited / VDI VPN (AnyConnect) Yes Yes Yes Yes Limited Limited ScanSafe Yes Yes Yes Yes Yes Yes Device AV/SPAM Yes Yes As Capable As Capable As capable As Capable Patch Management Yes Yes Yes Yes Yes No CSA/HIPS Yes Yes Yes No Yes No Password Protected Yes Yes Yes Yes Yes No Encryption/Remote Wipe/Asset Yes Yes Yes Yes No No Management Device Identity/Certificate Yes Yes Yes Yes Yes Yes Device Authentication (TrustSec, ISE) Yes Yes Yes Yes No No User Authentication (TrustSec, ISE) Yes Yes Yes Yes Yes Yes Application App store, application virtualization Yes Yes Yes Yes No No Mobile App Development & Security Yes Yes Yes Yes No No Data /Policy/Process Secure Data Storage (on device) Yes Yes Yes Yes No No

Policy Evolution: Acceptable Use, Rules of Use

Hard Work & Results: Company Gains 52% more devices 18% more users 24% fewer cases

Hard Work & Results: Company Gains We Also Project: Removal of Local IT for Extranet Partners Cost of reduced ACL changes Security Monitoring Support Cost reduction

BYOD Application

Top 10 - Major IT BYOD Questions How To: Increase visibility and policy based control? Deal with Architectural Change? Enable Service Delivery? Manage Identity, Entitlement & Access? Maintain Cost, Licensing & Asset Controls? Manage Deperimeterization Scenarios? Understand Impact to Compliance? Maintain Standards? Deal with Application Interoperability? Ch g O ti l & S t

How to Embrace Mobility While Ensuring Security Some Questions to Answer Do I have the WLAN capacity and reliability to support increase in mobile devices and future applications? How do I enforce security policies on non-compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don t have visibility? How do I minimize emerging threats targeted at mobile devices? How do I monitor and troubleshoot user and client connectivity issues on my access (wired/wireless) network? Is my network capable of delivering the scalability and performance required to realize the benefits of a BYOD strategy?

Summary On Your BYOD Journey Establish Governance Business Sponsors HR and Legal Align to Broader IT strategy Workforce Enablement & Mobility Globalization & New Business Model Cloud Transition Take a user Centric Approach Employees, Contractors, Partners Balance Risk Management with TCO, User Experience and Security Take Architectural & Phased Approach to Delivery Bake Security Architecture into the broader business and IT architecture Educate & Communicate!!!

Thank You