Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com



Similar documents
ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY

BYOD: BRING YOUR OWN DEVICE.

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Leveraging Bring Your Own Device Programs Network Services Engineered to Enable Employee Choice, Mobility and Security.

Secure Your Mobile Device Access with Cisco BYOD Solutions

Symantec Mobile Management Suite

WHITEPAPER. BYOD Best Practices. Requirements and Challenges. Copyright 2013 Meru Networks, Inc. All rights reserved.

Athena Mobile Device Management from Symantec

BYOD Policy & Management Part I

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Bring Your Own ipad to Work

An Intelligent Solution for the Mobile Enterprise

Bring Your Own ipad to Work January 2011

IT Enterprise Services

BYOD Networks for Kommuner

Chris Boykin VP of Professional Services

Embracing Complete BYOD Security with MDM and NAC

Mobile Security: The good, the bad, the way forward

Cisco Mobile Collaboration Management Service

Mobile Device Management for CFAES

How To Make Your Phone A Mobile Device Safe And Secure

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

Securing BYOD With Network Access Control, a Case Study

2014 Cisco and/or its affiliates. All rights reserved.

Symantec Mobile Management 7.1

How To Write A Mobile Device Policy

Empowering Students with Mobility and BYOD Technology

DYNAMIC SECURE MOBILE ACCESS

Symantec Mobile Management 7.1

Meraki: Introduction to Cloud Networking

Mobile Device Strategy

Enterprise Mobility as a Service

BYOD in Healthcare. Improving Clinician Productivity and Patient Satisfaction May 2013 WHITEPAPER

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Symantec Mobile Management for Configuration Manager 7.2

Workplace-as-a-Service BYOD Management

MDM Mobile Device Management

Extending Collaboration to BYOD Devices

Simple, scalable and secure unified wired and wireless networking

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Systems Manager Cloud Based Mobile Device Management

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Advanced Configuration Steps

Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless

The Bring Your Own Device Era:

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Symantec Mobile Management 7.2

Mobile Device Management

Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION

Tuesday, June 5, 12. Mobile Device Usage

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Conquering today s bring-your-own-device challenges

How To Protect Your Mobile Devices From Security Threats

BYOD Strategies: Chapter I

ClearPass: Understanding BYOD and today s evolving network access security requirements

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Is Your Network Ready for the ipad?

Smart Givaudan. From BYOD experience to new mobile opportunities

Bring Your Own Device Mobile Security

QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i

Brocade and Aruba Deliver Optimized and Effortless Mobility

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

What We Do: Simplify Enterprise Mobility

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Generating leads with Meraki's Systems Manager. Partner Training"

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

Meru MobileFLEX Architecture

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Activity sectors of UCOPIA.

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Good for Enterprise Good Dynamics

Systems Manager Cloud-Based Enterprise Mobility Management

Mobile Application Management

White Paper. BYOD Best Practices. Requirements and Challenges. January 31, Copyright 2012 Meru. All rights reserved.

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

The Holistic Guide to BYOD in Your Business Jazib Frahim

Symantec Mobile Management 7.2

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

IT Enterprise Services

Monitoring & Measuring: Wi-Fi as a Service

MaaS360 Mobile Device Management (MDM) Administrators Guide

Mobile Security Fall 2013

Conquering Today s Bring Your Own Device Challenges. A framework for successful BYOD initiatives

Eliminating the cost and complexity of hardware controllers with cloud-based centralized management

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

WLAN solutions to manage 1:1 and BYOD in K-12

Addressing BYOD Challenges with ForeScout and Motorola Solutions

The flexible workplace: Unlocking value in the bring your own device era

Your Pad or Mine? Enabling Secure Personal and Mobile Device Use On Your Network

BYOD(evice) without BYOI(nsecurity)

Transcription:

Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

ipad in the News More and more ipads will find their way into the workplace in 2011, but the vast majority won t (60 to 70%) be purchased by IT departments. Financial Services will lead the way in ipad adoption. ipad poised to revolutionize retail industry. Math that moves: Schools embrace the ipad. Restaurants uploading menus to ipad for diners. With the ipad, Apple may just revolutionize medicine.

Consumerization of IT: A Perfect Storm Multimedia Mobile Devices Custom enterprise multimedia apps > 50% of employees adopting video Collaboration Fortune 100 >80% deploying ipad & iphone Smartphones 289M in 2010 1B in 2013* Tablets 54.8M in 2011 300M in 2013* 10x growth by 2013! Social Business: Jive, Chatter, Yammer Connections: Lync, Telepresence, Facetime Virtual Desktops Virtual Desktops:45M installations by 2013 Citrix XenDesktop, VMware View (*) Source: Gartner

Dramatic Shift in Device Mix For the first time in ~30yrs: Less than 50% of devices are now Windows/Intelbased! 100% of the Fortune 500 have ratified ios ipad Sales: 111% increase YoY(15.4M units last Q) *Apple Q1 Results

CIO Concerns Secure Access Reliable Service Minimal Cost

How Do You Make BYOD Work in Your Environment? BYOD 2012+ ios Android Ultrabooks We need to keep my network and my users protected VPN ANY NETWORK ANY USER We need to provide a reliable & intuitive experience to our employees & guest We need to minimize impact to our IT and helpdesk staff

Device Fingerprinting Key Innovation Identify Device types with Model and OS as they connect e.g. ios, Android, Windows, RIM Distinguish user on IT issued laptop vs. same user on personal device Apply per User and per Device Access Control User & Device Aware Architecture

Device Context for Role Based Access

How it Works? Applications Zero IT touch, Apple Facetime (QoS level 7) context Virtual Desktop aware (QoS access level 4) Internet (QoS level 1) Auto-identification of user, device, application 2. Device Fingerprintin 6. 9. Adaptive VLAN Radio g Pooling Management 5. Application Fingerprintin 4. 8. Context AAA Aware g FastConnect Access Control 10. Bandwidth contracts Monitoring, reporting per user and per device 3. ipad Self Registration Context User: Joe Smith Dept: Finance Device: Apple ipad Date: M-F, 8am-5pm Location: Campus 802.11n AP 1. User Fingerprintin g Active Directory Mobility Controller Policy Manager 7. User and Device Visibility Management

Enabling BYOD Wireless Network Parts Management Mobility Access Complete Controller Policy Management Access Onramps WLAN LAN Remote Office On the Road Outdoor Indoor

BYOD Steps To Enable Secure Network Access for Mobile Devices 1 Onboard Device 2 Invoke a Policy 3 Enforce Policy

Automate Employee Onboarding 1 Access Network 1. Connects to web portal Policy Manager 2. VPN Configures 802.1x, VPN & e-mail and provisions device credentials 3. Application installer

Control Compromised Devices Access Network Policy Manager Detect unsecure devices Minimal Risk to Network Block access to network resources across wireless & remote Auto-Remediate the device

Invoke an Access Policy 2 BYOD Policy Allow personal devices into a limited access zone (LAZ) Executive Class Policy Deliver executive traffic with higher priority Multimedia Policy Optimize delivery of Lync traffic over the air Policy Unauthorized Use Policy Disable Rogue AP, Blacklist User Device Revocation Policy Disable device access, not user access, if stolen/lost VPN Device Quarantine Policy Quarantine unhealthy devices for remediation

Automate Guest OnBoarding New Visitor Access Network Policy Manager 1. Collect visitor information 2. Sponsor 3. Sponsor prompted to confirm that guest is valid Account enabled, visitor notified via screen, SMS, or email

USER ACCURACY Corporate Policy Device Detection: 5-Tier Profiling ipad 1 ios 5.0.1 Profile Confidence: ~100% DEVICE PROVISIONING IDENTITY CENTRIC PROFILING What would you rather have as the basis for: Network security? User experience? NETWORK HEURISTICS PROFILING Profile Confidence:?? EVENTS-CENTRIC FINGERPRINTING BASELINE FINGERPRINTING

Enforce a Policy Across Any Network 3 POLICY DECISION POLICY ENFORCEMENT: Any Network Policy Enforcement Optimized for Mobility

What About MDM? Network Infrastructure Manage Device Access Desktop Management Manage the Device Protect the network Identify the user Restrict usage & bandwidth Devicelevel visibility Configure network settings Provision & revoke device credentials Push & provision apps MDM Remote wipe & control Firmware & patch management Early Feature Sets Industry Specialist

Is This How You Think About Wireless? The truth: Wireless is MORE secure than wired (if you do it right)

Wired Network Security Questions On your wired network... Do you authenticate all users and devices? Do you encrypt all traffic? Do you control access to network resources based on user identity and/or Device? Wireless lets you do all of this by design

Thank You